[go: up one dir, main page]

Jain, 2011 - Google Patents

Intrusion Detection

Jain, 2011

View PDF
Document ID
8973807070767002272
Author
Jain R
Publication year

External Links

Snippet

1. Select target using IP lookup tools 2. Map network for accessible services 3. Identify potentially vulnerable services 4. Brute force (guess) passwords 5. Install remote administration tool 6. Wait for admin to log on and capture password 7. Use password to …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Adil et al. Preventive techniques of phishing attacks in networks
Agarwal et al. A closer look at intrusion detection system for web applications
US10320814B2 (en) Detection of advanced persistent threat attack on a private computer network
McHugh Intrusion and intrusion detection
Eian et al. Cyber attacks in the era of covid-19 and possible solution domains
Marinova-Boncheva A short survey of intrusion detection systems
Onyshchenko et al. Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism
KR et al. Intrusion detection tools and techniques–a survey
Adeleke Intrusion detection: issues, problems and solutions
Miloslavskaya et al. Taxonomy for unsecure big data processing in security operations centers
Labib Computer security and intrusion detection
Beigh et al. Intrusion detection and prevention system: issues and challenges
Samani et al. Intrusion detection system for DoS attack in cloud
Gerža et al. Security of ISES measureserver® module for remote experiments against malign attacks
Rogers et al. Mitigating Higher Ed Cyber Attacks.
Jayasekara Security operations & incident management: Case study analysis
Jain Intrusion Detection
Marinova-Boncheva Applying a data mining method for intrusion detection
Miloslavskaya et al. Taxonomy for unsecure digital information processing
De La Peña Montero et al. Autonomic and integrated management for proactive cyber security (AIM-PSC)
Gebreyes Denial of Service Attacks: Difference in Rates, Duration, and Financial Damages and the Relationship between Company Assets and Revenues
Nayak Research on application of intrusion detection system in data mining
Linora et al. Intrusion detection and prevention by using light weight virtualization in web applications
Mabika Supervised Learning on Active directory with overcoming cybersecurity challenges
Nair et al. Advanced Cybersecurity Tools and Techniques