Verwoerd et al., 2002 - Google Patents
Security architecture testing using IDS—a case studyVerwoerd et al., 2002
- Document ID
- 1887431438016859090
- Author
- Verwoerd T
- Hunt R
- Publication year
- Publication venue
- Computer Communications
External Links
Snippet
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusses some of the fundamental shortcomings present in access control, cryptography, intrusion …
- 238000000034 method 0 abstract description 41
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ndatinya et al. | Network forensics analysis using Wireshark | |
US7984493B2 (en) | DNS based enforcement for confinement and detection of network malicious activities | |
US10289857B1 (en) | Enforcement of same origin policy for sensitive data | |
Gillman et al. | Protecting websites from attack with secure delivery networks | |
Schneider | The state of network security | |
Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
Hudaib et al. | DNS advanced attacks and analysis | |
Hindy et al. | A taxonomy of malicious traffic for intrusion detection systems | |
Jeyanthi | Internet of things (IoT) as interconnection of threats (IoT) | |
Govil et al. | Criminology of botnets and their detection and defense methods | |
Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. | |
Dutta et al. | Intrusion detection systems fundamentals | |
Bhimireddy et al. | Web security and web application security: Attacks and prevention | |
Nagesh et al. | A survey on denial of service attacks and preclusions | |
Sheikh | Certified Ethical Hacker (CEH) Preparation Guide | |
Verwoerd et al. | Security architecture testing using IDS—a case study | |
Durairaj et al. | A study on securing cloud environment from DDoS attack to preserve data availability | |
Hyppönen | Securing a linux server against cyber attacks | |
Singh Verma et al. | Hard-coded credentials and web service in iot: Issues and challenges | |
Pandey et al. | Comprehensive security mechanism for defending cyber attacks based upon spoofing and poisoning | |
Iacob | Data security for e-learning platforms | |
Harrison et al. | A protocol layer survey of network security | |
Yin et al. | A Honeyfarm Data Control Mechanism: Design, Implementation, Evaluation and Forensic Study | |
Thangavel et al. | Session Hijacking over Cloud Environment: A Literature Survey | |
Upadhyay et al. | Security Flaw in TCP/IP and Proposed Measures |