Nalavade et al., 2011 - Google Patents
Layered Security Framework for Intrusion PreventionNalavade et al., 2011
View PDF- Document ID
- 12172155427727411788
- Author
- Nalavade K
- Meshram B
- Publication year
- Publication venue
- IJCSNS International Journal of Computer Science and Network Security
External Links
Snippet
Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Due to vulnerabilities in the network system, protecting network from malicious activities is prime concern today. It is important to …
- 230000002265 prevention 0 title description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1656731B (en) | Network security system and method based on multi-method gateway | |
US7644151B2 (en) | Network service zone locking | |
CN111641639B (en) | An IPv6 Network Security Protection System | |
Jafarian et al. | Detecting network scanning through monitoring and manipulation of dns traffic | |
Kizza | Firewalls | |
Achi et al. | Network security approach for digital forensics analysis | |
Nalavade et al. | Layered Security Framework for Intrusion Prevention | |
Trabelsi et al. | Spoofed ARP packets detection in switched LAN networks | |
Singhrova | A host based intrusion detection system for DDoS attack in WLAN | |
Kamal et al. | Analysis of network communication attacks | |
Whyte et al. | Addressing malicious smtp-based mass-mailing activity within an enterprise network | |
Biswas et al. | Network Forensics Analysis | |
Nakato | Networks Security: Attacks and Defense Mechanism by Designing an Intelligent Firewall Agent | |
Hongach Jr | Mitigating security flaws in the tcp/ip protocol suite | |
Gurusamy | DIPLOMA THESIS ASSIGNMENT | |
Mclain et al. | Making network intrusion detection work with IPsec | |
Bhuvaneswari | Basics of Network Security | |
Sulaman | An Analysis and Comparison of The Security Features of Firewalls and IDSs | |
Mulge | Intrusion Detection | |
Mulge | Intrusion Detection For Know | |
Leon | Classification, testing and optimization of intrusion detection systems | |
Venuti et al. | Deliverable DJ2. 4.1: Specification of Advanced Methods for Incident and Security Threats' Detection and Mitigation in a Multi-Domain Environment | |
MS17902830 | A Distributed Defense System that Features Hybrid Intelligent IDS to Mitigate Network Layer DDoS Attacks | |
Krishnamurthy | James Joshi University of Pittsburgh, USA | |
Rivera | Analysis of hostile network reconnaissance to anticipate and mitigate network attacks |