[go: up one dir, main page]

Nalavade et al., 2011 - Google Patents

Layered Security Framework for Intrusion Prevention

Nalavade et al., 2011

View PDF
Document ID
12172155427727411788
Author
Nalavade K
Meshram B
Publication year
Publication venue
IJCSNS International Journal of Computer Science and Network Security

External Links

Snippet

Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Due to vulnerabilities in the network system, protecting network from malicious activities is prime concern today. It is important to …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
CN1656731B (en) Network security system and method based on multi-method gateway
US7644151B2 (en) Network service zone locking
CN111641639B (en) An IPv6 Network Security Protection System
Jafarian et al. Detecting network scanning through monitoring and manipulation of dns traffic
Kizza Firewalls
Achi et al. Network security approach for digital forensics analysis
Nalavade et al. Layered Security Framework for Intrusion Prevention
Trabelsi et al. Spoofed ARP packets detection in switched LAN networks
Singhrova A host based intrusion detection system for DDoS attack in WLAN
Kamal et al. Analysis of network communication attacks
Whyte et al. Addressing malicious smtp-based mass-mailing activity within an enterprise network
Biswas et al. Network Forensics Analysis
Nakato Networks Security: Attacks and Defense Mechanism by Designing an Intelligent Firewall Agent
Hongach Jr Mitigating security flaws in the tcp/ip protocol suite
Gurusamy DIPLOMA THESIS ASSIGNMENT
Mclain et al. Making network intrusion detection work with IPsec
Bhuvaneswari Basics of Network Security
Sulaman An Analysis and Comparison of The Security Features of Firewalls and IDSs
Mulge Intrusion Detection
Mulge Intrusion Detection For Know
Leon Classification, testing and optimization of intrusion detection systems
Venuti et al. Deliverable DJ2. 4.1: Specification of Advanced Methods for Incident and Security Threats' Detection and Mitigation in a Multi-Domain Environment
MS17902830 A Distributed Defense System that Features Hybrid Intelligent IDS to Mitigate Network Layer DDoS Attacks
Krishnamurthy James Joshi University of Pittsburgh, USA
Rivera Analysis of hostile network reconnaissance to anticipate and mitigate network attacks