Alexeevskaya et al., 2023 - Google Patents
Forensic search for traces of unauthorized access using the Kerberos authentication protocolAlexeevskaya et al., 2023
- Document ID
- 10332488999399397805
- Author
- Alexeevskaya Y
- Molodtsova Y
- Alexeevsky R
- Publication year
- Publication venue
- 2023 International Russian Smart Industry Conference (SmartIndustryCon)
External Links
Snippet
Organizations use Windows Active Directory service to authenticate users on the network with Kerberos extended Authentication Protocol. According to IT Governance for 2022, there were revealed 1,063 incidents involving approximately 480,014,323 compromised network …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Indu et al. | Identity and access management in cloud environment: Mechanisms and challenges | |
US10057282B2 (en) | Detecting and reacting to malicious activity in decrypted application data | |
US9866566B2 (en) | Systems and methods for detecting and reacting to malicious activity in computer networks | |
Kim et al. | A security analysis of blockchain-based did services | |
US10333930B2 (en) | System and method for transparent multi-factor authentication and security posture checking | |
Alsirhani et al. | Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing. | |
US20240012933A1 (en) | Integration of identity access management infrastructure with zero-knowledge services | |
US11616780B2 (en) | Security protection against threats to network identity providers | |
Mutaher et al. | Security-enhanced SDN controller based Kerberos authentication protocol | |
Qatinah et al. | Kerberos Protocol: Security Attacks and Solution | |
Alexeevskaya et al. | Forensic search for traces of unauthorized access using the Kerberos authentication protocol | |
Ferretti et al. | Authorization transparency for accountable access to IoT services | |
US20170295142A1 (en) | Three-Tiered Security and Computational Architecture | |
Bao et al. | Towards the trust-enhancements of single sign-on services | |
Simpson et al. | Secure Identity for Enterprises. | |
Gupta et al. | JWTAMH: JSON Web Tokens Based Authentication Mechanism for Hadoop. | |
Karthiga et al. | Enhancing performance of user authentication protocol with resist to password reuse attacks | |
Freimanis | Vulnerability Assessment of Authentication Methods in a Large-Scale Computer System | |
Khaleel | Review of Network Authentication Based on Kerberos Protocol. | |
Arora | Hardening Kerberos Authentication Using Honeywords | |
Revalla et al. | On providing user-level data privacy in cloud | |
Gopal et al. | An Encryption based Security Enhancer Tool for IaaS Applications in Cloud Computing | |
Jadeja et al. | Analysis and Impact of Different | |
Gunjal et al. | Enhancing Kerberos Security using Public Key and Context-Aware Access Control | |
Karouei et al. | US approach to moving toward Zero Trust Cyber Security Principles |