Kamal et al., 2020 - Google Patents
Security and Privacy Issues in Wireless Networks and Mitigation MethodsKamal et al., 2020
View PDF- Document ID
- 2939329833086916126
- Author
- Kamal A
- Yen C
- Ling P
- et al.
- Publication year
External Links
Snippet
The rapid growth of network services, Internet of Things devices and online users on the Internet have led to an increase in the amount of data transmitted daily. As more and more information is stored and transmitted on the Internet, cybercriminals are trying to gain access …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Eian et al. | Cyber attacks in the era of covid-19 and possible solution domains | |
Chhikara et al. | Phishing & anti-phishing techniques: Case study | |
Prasad et al. | Cyber threats and attack overview | |
Wadhwa et al. | A Review on Cyber Crime: Major Threats and Solutions. | |
Afaq et al. | A critical analysis of cyber threats and their global impact | |
Hurkała et al. | Architecture of context-risk-aware authentication system for web environments | |
Banoth et al. | Implementation and mitigation for cyber attacks with proposed OCR process model. | |
Souley et al. | A captcha-based intrusion detection model | |
AlMudahi et al. | Social media privacy issues, threats, and risks | |
Asish et al. | Cyber security at a glance | |
Deo et al. | Information security-recent attacks in Fiji | |
Thangamuthu et al. | Cybercrime | |
Elnaim et al. | The current state of phishing attacks against Saudi Arabia university students | |
Singh et al. | A detailed survey and classification of commonly recurring cyber attacks | |
Hussain et al. | A survey on cyber security threats and their solutions | |
Hamirani | The challenges for cyber security in e-commerce | |
CHOPRA et al. | Cyber-Attacks Identification and Measures for Prevention | |
Kamal et al. | Security and Privacy Issues in Wireless Networks and Mitigation Methods | |
Bhati et al. | Prevention approach of phishing on different websites | |
Shukla et al. | Cyber security techniques management | |
Akpan et al. | Leveraging on Cyber Security for Digital Economy: Analysis of Emerging Cyber Security Threats and Attacks | |
Luckett | Phishing resistant systems: A literature review | |
Muttoo et al. | Analysing security checkpoints for an integrated utility-based information system | |
Arthan et al. | Dark Web and Cyber Scams: A Growing Threat to Online Safety | |
Rao et al. | Investigation of Phishing Attacks and Means to Utilize Anti Phishing Techniques |