[go: up one dir, main page]

Alexeevskaya et al., 2023 - Google Patents

Forensic search for traces of unauthorized access using the Kerberos authentication protocol

Alexeevskaya et al., 2023

Document ID
10332488999399397805
Author
Alexeevskaya Y
Molodtsova Y
Alexeevsky R
Publication year
Publication venue
2023 International Russian Smart Industry Conference (SmartIndustryCon)

External Links

Snippet

Organizations use Windows Active Directory service to authenticate users on the network with Kerberos extended Authentication Protocol. According to IT Governance for 2022, there were revealed 1,063 incidents involving approximately 480,014,323 compromised network …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Indu et al. Identity and access management in cloud environment: Mechanisms and challenges
US10057282B2 (en) Detecting and reacting to malicious activity in decrypted application data
US9866566B2 (en) Systems and methods for detecting and reacting to malicious activity in computer networks
Kim et al. A security analysis of blockchain-based did services
US10333930B2 (en) System and method for transparent multi-factor authentication and security posture checking
Alsirhani et al. Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.
US20240012933A1 (en) Integration of identity access management infrastructure with zero-knowledge services
US11616780B2 (en) Security protection against threats to network identity providers
Mutaher et al. Security-enhanced SDN controller based Kerberos authentication protocol
Qatinah et al. Kerberos Protocol: Security Attacks and Solution
Alexeevskaya et al. Forensic search for traces of unauthorized access using the Kerberos authentication protocol
Ferretti et al. Authorization transparency for accountable access to IoT services
US20170295142A1 (en) Three-Tiered Security and Computational Architecture
Bao et al. Towards the trust-enhancements of single sign-on services
Simpson et al. Secure Identity for Enterprises.
Gupta et al. JWTAMH: JSON Web Tokens Based Authentication Mechanism for Hadoop.
Karthiga et al. Enhancing performance of user authentication protocol with resist to password reuse attacks
Freimanis Vulnerability Assessment of Authentication Methods in a Large-Scale Computer System
Khaleel Review of Network Authentication Based on Kerberos Protocol.
Arora Hardening Kerberos Authentication Using Honeywords
Revalla et al. On providing user-level data privacy in cloud
Gopal et al. An Encryption based Security Enhancer Tool for IaaS Applications in Cloud Computing
Jadeja et al. Analysis and Impact of Different
Gunjal et al. Enhancing Kerberos Security using Public Key and Context-Aware Access Control
Karouei et al. US approach to moving toward Zero Trust Cyber Security Principles