Nonyelum et al., 2016 - Google Patents
Hybrid Incident Response Digital Traceback Technique in Network-Based Intrusion Source DetectionNonyelum et al., 2016
- Document ID
- 18298001861257950482
- Author
- Nonyelum O
- Nonye O
- Publication year
- Publication venue
- IUP Journal of Computer Sciences
External Links
Snippet
The proposed system called hybrid incident response digital traceback technique combines the digital forensic techniques and fusion-based IP traceback technology, which was used in identifying the source of network-based intrusion faster with a distinct alert. The digital …
- 238000001514 detection method 0 title abstract description 45
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2767056B1 (en) | A method and a system to detect malicious software | |
US20060026681A1 (en) | System and method of characterizing and managing electronic traffic | |
CN107070929A (en) | A kind of industry control network honey pot system | |
Chen et al. | Intrusion detection | |
KR100947211B1 (en) | Active Security Audit System | |
Lin et al. | Implementation of an SDN-based security defense mechanism against DDoS attacks | |
US7269649B1 (en) | Protocol layer-level system and method for detecting virus activity | |
Sadasivam et al. | Honeynet data analysis and distributed SSH brute-force attacks | |
Somwanshi et al. | Implementation of honeypots for server security | |
Ahmed et al. | A Linux-based IDPS using Snort | |
Sulieman et al. | Detecting zero-day polymorphic worm: A review | |
Rai et al. | Intrusion detection systems: A review | |
Ramakrishnan et al. | Pandora: An IOT based Intrusion Detection Honeypot with Real-time Monitoring | |
Nonyelum et al. | Hybrid Incident Response Digital Traceback Technique in Network-Based Intrusion Source Detection | |
Ji et al. | Botnet detection and response architecture for offering secure internet services | |
Singhrova | A host based intrusion detection system for DDoS attack in WLAN | |
Singh et al. | A review on intrusion detection system | |
KR101025502B1 (en) | System and method for detecting and responding to network-based IRC and HPTB botnets | |
Sable et al. | A review-botnet detection and suppression in clouds | |
Kumar et al. | Recent advances in intrusion detection systems: An analytical evaluation and comparative study | |
KR102851776B1 (en) | Method for identifying attack infrastructure and system therefor | |
Pandey et al. | IDS CRITERIA FOR ENHANCED SECURITY OVER CLOUD. | |
Ezin et al. | Java-Based Intrusion Detection System in a Wired Network | |
Dave et al. | Efficacy of Attack detection capability of IDPS based on it's deployment in wired and wireless environment | |
Hashim et al. | Computer network intrusion detection software development |