[go: up one dir, main page]

Hindy et al., 2018 - Google Patents

A taxonomy of malicious traffic for intrusion detection systems

Hindy et al., 2018

View PDF
Document ID
3305575577733877701
Author
Hindy H
Hodo E
Bayne E
Seeam A
Atkinson R
Bellekens X
Publication year
Publication venue
2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)

External Links

Snippet

With the increasing number of network threats it is essential to have a knowledge of existing and new network threats in order to design better intrusion detection systems. In this paper we propose a taxonomy for classifying network attacks in a consistent way, allowing security …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Mallick et al. Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments
Liang et al. Evolution of firewalls: Toward securer network using next generation firewall
Roy et al. Survey and taxonomy of adversarial reconnaissance techniques
Almutairi et al. Hybrid botnet detection based on host and network analysis
US10587636B1 (en) System and method for bot detection
US8561177B1 (en) Systems and methods for detecting communication channels of bots
EP2156361B1 (en) Reduction of false positive reputations through collection of overrides from customer deployments
Hunt et al. Network forensics: an analysis of techniques, tools, and trends
Ling et al. Torward: Discovery, blocking, and traceback of malicious traffic over tor
Ling et al. TorWard: Discovery of malicious traffic over Tor
Hindy et al. A taxonomy of malicious traffic for intrusion detection systems
Haddadi et al. DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
Bdair et al. Brief of intrusion detection systems in detecting ICMPv6 attacks
Siddiqui et al. Survey on unified threat management (UTM) systems for home networks
Agrawal et al. Wireless rogue access point detection using shadow honeynet
Auliar et al. Security in iot-based smart homes: A taxonomy study of detection methods of mirai malware and countermeasures
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Patel et al. A snort-based secure edge router for smart home
Hunt New developments in network forensics—Tools and techniques
Nagesh et al. A survey on denial of service attacks and preclusions
Sulieman et al. Detecting zero-day polymorphic worm: A review
Bansal et al. Botnet forensics framework: Is your system a bot
Rai et al. Intrusion detection systems: A review
Gaylah et al. Mitigation and prevention methods for distributed denial-of-service attacks on network servers
Pandey et al. IDS CRITERIA FOR ENHANCED SECURITY OVER CLOUD.