[go: up one dir, main page]

Harale et al., 2016 - Google Patents

Network based intrusion detection and prevention systems: Attack classification, methodologies and tools

Harale et al., 2016

View PDF
Document ID
8165191981585411633
Author
Harale N
Meshram B
Publication year
Publication venue
International Journal of Engineering And Science

External Links

Snippet

Complex and common security attackshave become a common issue nowadays. Success rate of detecting these attacks through existing tools seems to be decreasing due to simple rule-bases Some attacks are too complex to identify for today's firewall systems. This paper …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
JP6080910B2 (en) System and method for network level protection against malicious software
KR et al. Intrusion detection tools and techniques–a survey
KR102501372B1 (en) AI-based mysterious symptom intrusion detection and system
JP2005517349A (en) Network security system and method based on multi-method gateway
Kurundkar et al. Network intrusion detection using Snort
Fakeeh An overview of DDoS attacks detection and prevention in the cloud
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
Mohammed et al. Automatic defense against zero-day polymorphic worms in communication networks
Carter et al. Intrusion prevention fundamentals
Bhimireddy et al. Web security and web application security: Attacks and prevention
Harale et al. Network based intrusion detection and prevention systems: Attack classification, methodologies and tools
Singh et al. Intrusion detection using network monitoring tools
Navin et al. A survey on intrusion detection system
Singh et al. A review on intrusion detection system
Karamagi Comptia Security+ Practice Exams
Rao et al. A Three-Pronged Approach to Mitigate Web Attacks
Kumar et al. Recent advances in intrusion detection systems: An analytical evaluation and comparative study
Khamdamovich et al. Web application firewall method for detecting network attacks
Sarkunavathi et al. A detailed study on advanced persistent threats: A sophisticated threat
Pir Intrusion detection techniques and open source intrusion detection (IDS) tools
Sharma et al. Analysis of IDS Tools & Techniques
Pannu et al. Systematic Approach Towards Analysis and Mitigation of Advanced Evasion Techniques
Harrison et al. A protocol layer survey of network security
Bansah et al. Implementation of Intrusion Detection System and Traffic Analysis–A Case of a Linux Platform
Patil et al. Snort, BRO, NetSTAT, Emerald and SAX2: A Comparison.