[go: up one dir, main page]

Nonyelum et al., 2016 - Google Patents

Hybrid Incident Response Digital Traceback Technique in Network-Based Intrusion Source Detection

Nonyelum et al., 2016

Document ID
18298001861257950482
Author
Nonyelum O
Nonye O
Publication year
Publication venue
IUP Journal of Computer Sciences

External Links

Snippet

The proposed system called hybrid incident response digital traceback technique combines the digital forensic techniques and fusion-based IP traceback technology, which was used in identifying the source of network-based intrusion faster with a distinct alert. The digital …
Continue reading at search.proquest.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms

Similar Documents

Publication Publication Date Title
EP2767056B1 (en) A method and a system to detect malicious software
US20060026681A1 (en) System and method of characterizing and managing electronic traffic
CN107070929A (en) A kind of industry control network honey pot system
Chen et al. Intrusion detection
KR100947211B1 (en) Active Security Audit System
Lin et al. Implementation of an SDN-based security defense mechanism against DDoS attacks
US7269649B1 (en) Protocol layer-level system and method for detecting virus activity
Sadasivam et al. Honeynet data analysis and distributed SSH brute-force attacks
Somwanshi et al. Implementation of honeypots for server security
Ahmed et al. A Linux-based IDPS using Snort
Sulieman et al. Detecting zero-day polymorphic worm: A review
Rai et al. Intrusion detection systems: A review
Ramakrishnan et al. Pandora: An IOT based Intrusion Detection Honeypot with Real-time Monitoring
Nonyelum et al. Hybrid Incident Response Digital Traceback Technique in Network-Based Intrusion Source Detection
Ji et al. Botnet detection and response architecture for offering secure internet services
Singhrova A host based intrusion detection system for DDoS attack in WLAN
Singh et al. A review on intrusion detection system
KR101025502B1 (en) System and method for detecting and responding to network-based IRC and HPTB botnets
Sable et al. A review-botnet detection and suppression in clouds
Kumar et al. Recent advances in intrusion detection systems: An analytical evaluation and comparative study
KR102851776B1 (en) Method for identifying attack infrastructure and system therefor
Pandey et al. IDS CRITERIA FOR ENHANCED SECURITY OVER CLOUD.
Ezin et al. Java-Based Intrusion Detection System in a Wired Network
Dave et al. Efficacy of Attack detection capability of IDPS based on it's deployment in wired and wireless environment
Hashim et al. Computer network intrusion detection software development