[go: up one dir, main page]

Kumar, 2016 - Google Patents

Denial of service attacks–an updated perspective

Kumar, 2016

View PDF
Document ID
10454624061757640512
Author
Kumar G
Publication year
Publication venue
Systems science & control engineering

External Links

Snippet

Network security is a specialized field consisting of the provisions and policies to prevent and monitor unauthorized access, misuse, modification or denial of a computer network and network-accessible resources as well as ensuring their availability through proper …
Continue reading at www.tandfonline.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering

Similar Documents

Publication Publication Date Title
Kumar Denial of service attacks–an updated perspective
Mallick et al. Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments
Sinha et al. Information Security threats and attacks with conceivable counteraction
Dayal et al. Research trends in security and DDoS in SDN
Cheema et al. [Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review
Adeyinka Internet attack methods and internet security technology
Damghani et al. Classification of attacks on IoT
Fereidouni et al. IoT and man‐in‐the‐middle attacks
Schneider The state of network security
Almuqren Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Kumar Understanding denial of service (dos) attacks using osi reference model
Göksel et al. Perimeter network security solutions: A survey
Siddiqui et al. Survey on unified threat management (UTM) systems for home networks
Rahamathullah et al. Distributed denial of service attacks prevention, detection and mitigation–A review
Govil et al. Criminology of botnets and their detection and defense methods
Chaitanya et al. Security and Privacy in Wireless Sensor Networks Using Intrusion Detection Models to Detect DDOS and Drdos Attacks: A Survey
Nagesh et al. A survey on denial of service attacks and preclusions
Rajan et al. DDoS mitigation techniques in IoT: A Survey
Balamurugan et al. Implementation of an effective methodology to avoid ddos attacks using cybersecurity norms
Marchetti et al. Cyber attacks on financial critical infrastructures
Sari Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir
Afzaal An overview of defense techniques against dos attacks
Ranjith et al. Design and implementation of a defense system from TCP injection attacks
Cao et al. Mimichunter: A general passive network protocol mimicry detection framework