[go: up one dir, main page]

Miller et al., 2015 - Google Patents

Traffic classification for the detection of anonymous web proxy routing

Miller et al., 2015

View PDF
Document ID
12564342125840794490
Author
Miller S
Curran K
Lunney T
Publication year
Publication venue
International Journal for Information Security Research

External Links

Snippet

There is an increasing need to be able to classify whether an incoming packet is from a legitimate originating IP address or has been modified through an intermediate proxy or node. Being able to verify the originating IP address allows a business (eg bank) to use …
Continue reading at kevincurran.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates

Similar Documents

Publication Publication Date Title
Ghafir et al. Botdet: A system for real time botnet command and control traffic detection
Agarwal et al. A closer look at intrusion detection system for web applications
Sinha et al. Information Security threats and attacks with conceivable counteraction
Modi et al. A survey of intrusion detection techniques in cloud
JP2008508805A (en) System and method for characterizing and managing electronic traffic
Adiwal et al. Dns intrusion detection (did)—a snort-based solution to detect dns amplification and dns tunneling attacks
Zain ul Abideen et al. VPN Traffic Detection in SSL‐Protected Channel
Jingyao et al. Securing a network: how effective using firewalls and VPNs are?
Miller et al. Traffic classification for the detection of anonymous web proxy routing
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Kumar et al. Study of intrusion detection system for DDoS attacks in cloud computing
Dutta et al. Tor—the onion router
Siddiqui et al. Survey on unified threat management (UTM) systems for home networks
Sidhardhan et al. Weaponizing real-world applications as c2 (command and control)
Miller et al. Securing the internet through the detection of anonymous proxy usage
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
US20240430287A1 (en) System and method for locating dga compromised ip addresses
Aravind et al. Tracing IP Addresses Behind Vpn/Proxy Servers
Adiwal et al. Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection
Veena et al. Implementing file and real time based intrusion detections in secure direct method using advanced honeypot
Pahal et al. Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation
Huang et al. Detecting Malicious Users Behind Circuit-Based Anonymity Networks
Durairaj et al. A study on securing cloud environment from DDoS attack to preserve data availability
Ruambo et al. Brute-force attack mitigation on remote access services via software-defined perimeter
Paya et al. Enhancing software-defined perimeters with integrated identity solutions and threat detection for robust zero trust security