Jimmy, 2024 - Google Patents
Senior Cloud consuJimmy, 2024
View PDF- Document ID
- 17214052290494504435
- Author
- Jimmy F
- Publication year
External Links
Snippet
The proliferation of internet usage has surged dramatically, prompting in businesses to conduct myriad transactions online rather than in physica onset of the COVID-19 pandemic has further propelled this trend. C traditional forms of crime have migrated to the digital …
- 238000001514 detection method 0 abstract description 44
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12244641B2 (en) | Application firewall | |
| Cinar et al. | The current state and future of mobile security in the light of the recent mobile security threat reports | |
| US10924517B2 (en) | Processing network traffic based on assessed security weaknesses | |
| US20090328210A1 (en) | Chain of events tracking with data tainting for automated security feedback | |
| Waheed et al. | Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure | |
| CN113824678A (en) | System and method for processing information security events to detect network attacks | |
| Dhiman et al. | Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques | |
| Ahmad et al. | Security challenges from abuse of cloud service threat | |
| Gounder et al. | New ways to fight malware | |
| Shaikh et al. | Exploring recent challenges in cyber security and their solutions | |
| Jimmy | Senior Cloud consu | |
| Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
| Lakshmi | Beginning Security with Microsoft Technologies | |
| Jawad et al. | Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems | |
| Morag | The threats to jupyter notebook | |
| Athukorale et al. | Evaluating Advanced Cybersecurity Technologies for Cloud Environments | |
| Agrawal et al. | Review of Cybersecurity Post-COVID-19 | |
| Neelakrishnan | Autonomous Data Security: Creating a Proactive Enterprise Protection Plan | |
| Zhang et al. | Controlling Network Risk in E-commerce | |
| Hassan et al. | Extraction of malware iocs and ttps mapping with coas | |
| Agbamoro | Software Testing, Data Security and GDPR | |
| RAO et al. | Cyber Security and Vulnerability Assessment | |
| Rehan | Building Secure Cloud Infrastructures: A Cybersecurity Overview | |
| Muteswa | Cyber security insights for individuals, governments & organizations (gathered articles): a North America, Asia, Africa, South America, Oceania & Europe perspective | |
| Lingamgunta | Cyber Security For Beginners |