[go: up one dir, main page]

Kamal et al., 2020 - Google Patents

Security and Privacy Issues in Wireless Networks and Mitigation Methods

Kamal et al., 2020

View PDF
Document ID
2939329833086916126
Author
Kamal A
Yen C
Ling P
et al.
Publication year

External Links

Snippet

The rapid growth of network services, Internet of Things devices and online users on the Internet have led to an increase in the amount of data transmitted daily. As more and more information is stored and transmitted on the Internet, cybercriminals are trying to gain access …
Continue reading at www.preprints.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering

Similar Documents

Publication Publication Date Title
Eian et al. Cyber attacks in the era of covid-19 and possible solution domains
Chhikara et al. Phishing & anti-phishing techniques: Case study
Prasad et al. Cyber threats and attack overview
Wadhwa et al. A Review on Cyber Crime: Major Threats and Solutions.
Afaq et al. A critical analysis of cyber threats and their global impact
Hurkała et al. Architecture of context-risk-aware authentication system for web environments
Banoth et al. Implementation and mitigation for cyber attacks with proposed OCR process model.
Souley et al. A captcha-based intrusion detection model
AlMudahi et al. Social media privacy issues, threats, and risks
Asish et al. Cyber security at a glance
Deo et al. Information security-recent attacks in Fiji
Thangamuthu et al. Cybercrime
Elnaim et al. The current state of phishing attacks against Saudi Arabia university students
Singh et al. A detailed survey and classification of commonly recurring cyber attacks
Hussain et al. A survey on cyber security threats and their solutions
Hamirani The challenges for cyber security in e-commerce
CHOPRA et al. Cyber-Attacks Identification and Measures for Prevention
Kamal et al. Security and Privacy Issues in Wireless Networks and Mitigation Methods
Bhati et al. Prevention approach of phishing on different websites
Shukla et al. Cyber security techniques management
Akpan et al. Leveraging on Cyber Security for Digital Economy: Analysis of Emerging Cyber Security Threats and Attacks
Luckett Phishing resistant systems: A literature review
Muttoo et al. Analysing security checkpoints for an integrated utility-based information system
Arthan et al. Dark Web and Cyber Scams: A Growing Threat to Online Safety
Rao et al. Investigation of Phishing Attacks and Means to Utilize Anti Phishing Techniques