[go: up one dir, main page]

Miloslavskaya, 2018 - Google Patents

Remote attacks taxonomy and their verbal indicators

Miloslavskaya, 2018

View PDF
Document ID
6282279352277717932
Author
Miloslavskaya N
Publication year
Publication venue
Procedia computer science

External Links

Snippet

To detect and to timely interrupt increasingly sophisticated attacks against modern networks, their systems, services and resources, it is especially important to understand the scenarios and phases of various possible attacks, specific for these networks. Based on the analysis of …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
US11438365B2 (en) Hierarchical risk assessment and remediation of threats in mobile networking environment
Ussath et al. Advanced persistent threats: Behind the scenes
Langer Cyber-security issues in healthcare information technology
Al-Turjman et al. An overview about the cyberattacks in grid and like systems
Aboelfotoh et al. A review of cyber-security measuring and assessment methods for modern enterprises
Gupta et al. Taxonomy of cloud security
Chivukula et al. A study of cyber security issues and challenges
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Aijaz et al. Security operations center—A need for an academic environment
Iftikhar et al. BOTNETs: A Network Security Issue
Sarowa et al. Analysis of Cyber Attacks and Cyber Incident Patterns over APCERT Member Countries
Sheikh Certified Ethical Hacker (CEH) Preparation Guide
Ramachandran et al. The improved cloud computing adoption framework to deliver secure services
Miloslavskaya Remote attacks taxonomy and their verbal indicators
Hassan Enterprise Defense Strategies Against Ransomware Attacks: Protection Against Ransomware Attacks on Corporate Environment
Alrubaie et al. A cybersecurity architecture to mitigate shamoon attacks
Rogers et al. Mitigating Higher Ed Cyber Attacks.
Khan et al. RANSOMWARE ATTACK MODELING: KEY SYSTEMIC VULNERABILITIES AND SAFETY PRACTICES EXPLOITS (PART-II)
Aljaidi et al. An assessment of obfuscated bad rabbit ransomware detection and prevention methods
Virvilis-Kollitiris Detecting advanced persistent threats through deception techniques
Mutemwa et al. Managing the Shift in the Enterprise Perimeter in order to delay a Cybersecurity Breach
Chellappan et al. Layered defense approach: towards total network security
Karamagi Comptia Security+ Practice Exams
Mohseni Network Security for Small Businesses
Alsmadi Information systems security management