Harale et al., 2016 - Google Patents
Network based intrusion detection and prevention systems: Attack classification, methodologies and toolsHarale et al., 2016
View PDF- Document ID
- 8165191981585411633
- Author
- Harale N
- Meshram B
- Publication year
- Publication venue
- International Journal of Engineering And Science
External Links
Snippet
Complex and common security attackshave become a common issue nowadays. Success rate of detecting these attacks through existing tools seems to be decreasing due to simple rule-bases Some attacks are too complex to identify for today's firewall systems. This paper …
- 238000001514 detection method 0 title abstract description 72
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6080910B2 (en) | System and method for network level protection against malicious software | |
KR et al. | Intrusion detection tools and techniques–a survey | |
KR102501372B1 (en) | AI-based mysterious symptom intrusion detection and system | |
JP2005517349A (en) | Network security system and method based on multi-method gateway | |
Kurundkar et al. | Network intrusion detection using Snort | |
Fakeeh | An overview of DDoS attacks detection and prevention in the cloud | |
Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
Carter et al. | Intrusion prevention fundamentals | |
Bhimireddy et al. | Web security and web application security: Attacks and prevention | |
Harale et al. | Network based intrusion detection and prevention systems: Attack classification, methodologies and tools | |
Singh et al. | Intrusion detection using network monitoring tools | |
Navin et al. | A survey on intrusion detection system | |
Singh et al. | A review on intrusion detection system | |
Karamagi | Comptia Security+ Practice Exams | |
Rao et al. | A Three-Pronged Approach to Mitigate Web Attacks | |
Kumar et al. | Recent advances in intrusion detection systems: An analytical evaluation and comparative study | |
Khamdamovich et al. | Web application firewall method for detecting network attacks | |
Sarkunavathi et al. | A detailed study on advanced persistent threats: A sophisticated threat | |
Pir | Intrusion detection techniques and open source intrusion detection (IDS) tools | |
Sharma et al. | Analysis of IDS Tools & Techniques | |
Pannu et al. | Systematic Approach Towards Analysis and Mitigation of Advanced Evasion Techniques | |
Harrison et al. | A protocol layer survey of network security | |
Bansah et al. | Implementation of Intrusion Detection System and Traffic Analysis–A Case of a Linux Platform | |
Patil et al. | Snort, BRO, NetSTAT, Emerald and SAX2: A Comparison. |