Indore, 2014 - Google Patents
A Result Analysis of Modified Hybrid Port Knocking (MHPK) with Strong AuthenticationIndore, 2014
- Document ID
- 12317857361378173005
- Author
- Indore C
- Publication year
- Publication venue
- vol
External Links
- 238000004458 analytical method 0 title abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8413248B2 (en) | Method for secure single-packet remote authorization | |
Adeyinka | Internet attack methods and internet security technology | |
Srivastava et al. | Advanced port knocking authentication scheme with QRC using AES | |
Abusaimeh | Security attacks in cloud computing and corresponding defending mechanisims | |
Roy et al. | Risk and Remedies of E-governance Systems | |
Al-Bahadili et al. | Network security using hybrid port knocking | |
Jeanquier | An Analysis of Port Knocking and Single Packet Authorization MSc Thesis | |
Atighetchi et al. | Safe configuration of TLS connections | |
Sathyadevan et al. | Portguard-an authentication tool for securing ports in an IoT gateway | |
Chahar | Computer network security | |
Indore | A Result Analysis of Modified Hybrid Port Knocking (MHPK) with Strong Authentication | |
Banoth et al. | Modern cryptanalysis methods, advanced network attacks and cloud security | |
Cárdenas et al. | Cyber security basic defenses and attack trends | |
Sahu et al. | Implementation of modified hybrid port knocking (MHPK) with strong authentication | |
Tariq et al. | Evaluating the Effectiveness and Resilience of SSL/TLS, HTTPS, IPSec, SSH, and WPA/WPA2 in Safeguarding Data Transmission | |
Yang et al. | Security on ipv6 | |
Granerud | Identifying TLS abnormalities in Tor | |
Efe et al. | Prevention Techniques for SSL Hacking Threats to E-Government Services | |
Datir | A Modified Hybrid Port Knocking Technique for Host Authentication: A Review | |
Liu et al. | Address knocking: An undetectable authentication based on IPv6 address | |
Srinivasan et al. | MULTILEVEL SECURITY MODEL IN INTRUSION DETECTION AND PREVENTION SYSTEMS WITH DIFFERENT CRYPTOGRAPHY ALGORITHMS | |
Sarvepalli | Designing Network Security Labs | |
Das | Cyber Deception Systems in Detecting Passive Adversaries | |
Reaz et al. | A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App | |
Juneja et al. | Improved Cryptographic Solution to ACIDS Attacks in CDEF Computing |