Jain, 2011 - Google Patents
Intrusion DetectionJain, 2011
View PDF- Document ID
- 8973807070767002272
- Author
- Jain R
- Publication year
External Links
Snippet
1. Select target using IP lookup tools 2. Map network for accessible services 3. Identify potentially vulnerable services 4. Brute force (guess) passwords 5. Install remote administration tool 6. Wait for admin to log on and capture password 7. Use password to …
- 238000001514 detection method 0 title description 14
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Adil et al. | Preventive techniques of phishing attacks in networks | |
Agarwal et al. | A closer look at intrusion detection system for web applications | |
US10320814B2 (en) | Detection of advanced persistent threat attack on a private computer network | |
McHugh | Intrusion and intrusion detection | |
Eian et al. | Cyber attacks in the era of covid-19 and possible solution domains | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
Onyshchenko et al. | Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism | |
KR et al. | Intrusion detection tools and techniques–a survey | |
Adeleke | Intrusion detection: issues, problems and solutions | |
Miloslavskaya et al. | Taxonomy for unsecure big data processing in security operations centers | |
Labib | Computer security and intrusion detection | |
Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
Samani et al. | Intrusion detection system for DoS attack in cloud | |
Gerža et al. | Security of ISES measureserver® module for remote experiments against malign attacks | |
Rogers et al. | Mitigating Higher Ed Cyber Attacks. | |
Jayasekara | Security operations & incident management: Case study analysis | |
Jain | Intrusion Detection | |
Marinova-Boncheva | Applying a data mining method for intrusion detection | |
Miloslavskaya et al. | Taxonomy for unsecure digital information processing | |
De La Peña Montero et al. | Autonomic and integrated management for proactive cyber security (AIM-PSC) | |
Gebreyes | Denial of Service Attacks: Difference in Rates, Duration, and Financial Damages and the Relationship between Company Assets and Revenues | |
Nayak | Research on application of intrusion detection system in data mining | |
Linora et al. | Intrusion detection and prevention by using light weight virtualization in web applications | |
Mabika | Supervised Learning on Active directory with overcoming cybersecurity challenges | |
Nair et al. | Advanced Cybersecurity Tools and Techniques |