Kumar, 2016 - Google Patents
Denial of service attacks–an updated perspectiveKumar, 2016
View PDF- Document ID
- 10454624061757640512
- Author
- Kumar G
- Publication year
- Publication venue
- Systems science & control engineering
External Links
Snippet
Network security is a specialized field consisting of the provisions and policies to prevent and monitor unauthorized access, misuse, modification or denial of a computer network and network-accessible resources as well as ensuring their availability through proper …
- 238000001514 detection method 0 abstract description 27
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar | Denial of service attacks–an updated perspective | |
Mallick et al. | Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments | |
Sinha et al. | Information Security threats and attacks with conceivable counteraction | |
Dayal et al. | Research trends in security and DDoS in SDN | |
Cheema et al. | [Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review | |
Adeyinka | Internet attack methods and internet security technology | |
Damghani et al. | Classification of attacks on IoT | |
Fereidouni et al. | IoT and man‐in‐the‐middle attacks | |
Schneider | The state of network security | |
Almuqren | Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions | |
Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
Kumar | Understanding denial of service (dos) attacks using osi reference model | |
Göksel et al. | Perimeter network security solutions: A survey | |
Siddiqui et al. | Survey on unified threat management (UTM) systems for home networks | |
Rahamathullah et al. | Distributed denial of service attacks prevention, detection and mitigation–A review | |
Govil et al. | Criminology of botnets and their detection and defense methods | |
Chaitanya et al. | Security and Privacy in Wireless Sensor Networks Using Intrusion Detection Models to Detect DDOS and Drdos Attacks: A Survey | |
Nagesh et al. | A survey on denial of service attacks and preclusions | |
Rajan et al. | DDoS mitigation techniques in IoT: A Survey | |
Balamurugan et al. | Implementation of an effective methodology to avoid ddos attacks using cybersecurity norms | |
Marchetti et al. | Cyber attacks on financial critical infrastructures | |
Sari | Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir | |
Afzaal | An overview of defense techniques against dos attacks | |
Ranjith et al. | Design and implementation of a defense system from TCP injection attacks | |
Cao et al. | Mimichunter: A general passive network protocol mimicry detection framework |