[go: up one dir, main page]

Verwoerd et al., 2002 - Google Patents

Security architecture testing using IDS—a case study

Verwoerd et al., 2002

Document ID
1887431438016859090
Author
Verwoerd T
Hunt R
Publication year
Publication venue
Computer Communications

External Links

Snippet

Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusses some of the fundamental shortcomings present in access control, cryptography, intrusion …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Ndatinya et al. Network forensics analysis using Wireshark
US7984493B2 (en) DNS based enforcement for confinement and detection of network malicious activities
US10289857B1 (en) Enforcement of same origin policy for sensitive data
Gillman et al. Protecting websites from attack with secure delivery networks
Schneider The state of network security
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Hudaib et al. DNS advanced attacks and analysis
Hindy et al. A taxonomy of malicious traffic for intrusion detection systems
Jeyanthi Internet of things (IoT) as interconnection of threats (IoT)
Govil et al. Criminology of botnets and their detection and defense methods
Patel et al. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.
Dutta et al. Intrusion detection systems fundamentals
Bhimireddy et al. Web security and web application security: Attacks and prevention
Nagesh et al. A survey on denial of service attacks and preclusions
Sheikh Certified Ethical Hacker (CEH) Preparation Guide
Verwoerd et al. Security architecture testing using IDS—a case study
Durairaj et al. A study on securing cloud environment from DDoS attack to preserve data availability
Hyppönen Securing a linux server against cyber attacks
Singh Verma et al. Hard-coded credentials and web service in iot: Issues and challenges
Pandey et al. Comprehensive security mechanism for defending cyber attacks based upon spoofing and poisoning
Iacob Data security for e-learning platforms
Harrison et al. A protocol layer survey of network security
Yin et al. A Honeyfarm Data Control Mechanism: Design, Implementation, Evaluation and Forensic Study
Thangavel et al. Session Hijacking over Cloud Environment: A Literature Survey
Upadhyay et al. Security Flaw in TCP/IP and Proposed Measures