Hindy et al., 2018 - Google Patents
A taxonomy of malicious traffic for intrusion detection systemsHindy et al., 2018
View PDF- Document ID
- 3305575577733877701
- Author
- Hindy H
- Hodo E
- Bayne E
- Seeam A
- Atkinson R
- Bellekens X
- Publication year
- Publication venue
- 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)
External Links
Snippet
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats in order to design better intrusion detection systems. In this paper we propose a taxonomy for classifying network attacks in a consistent way, allowing security …
- 238000001514 detection method 0 title abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mallick et al. | Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments | |
Liang et al. | Evolution of firewalls: Toward securer network using next generation firewall | |
Roy et al. | Survey and taxonomy of adversarial reconnaissance techniques | |
Almutairi et al. | Hybrid botnet detection based on host and network analysis | |
US10587636B1 (en) | System and method for bot detection | |
US8561177B1 (en) | Systems and methods for detecting communication channels of bots | |
EP2156361B1 (en) | Reduction of false positive reputations through collection of overrides from customer deployments | |
Hunt et al. | Network forensics: an analysis of techniques, tools, and trends | |
Ling et al. | Torward: Discovery, blocking, and traceback of malicious traffic over tor | |
Ling et al. | TorWard: Discovery of malicious traffic over Tor | |
Hindy et al. | A taxonomy of malicious traffic for intrusion detection systems | |
Haddadi et al. | DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment | |
Bdair et al. | Brief of intrusion detection systems in detecting ICMPv6 attacks | |
Siddiqui et al. | Survey on unified threat management (UTM) systems for home networks | |
Agrawal et al. | Wireless rogue access point detection using shadow honeynet | |
Auliar et al. | Security in iot-based smart homes: A taxonomy study of detection methods of mirai malware and countermeasures | |
Simkhada et al. | Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review | |
Patel et al. | A snort-based secure edge router for smart home | |
Hunt | New developments in network forensics—Tools and techniques | |
Nagesh et al. | A survey on denial of service attacks and preclusions | |
Sulieman et al. | Detecting zero-day polymorphic worm: A review | |
Bansal et al. | Botnet forensics framework: Is your system a bot | |
Rai et al. | Intrusion detection systems: A review | |
Gaylah et al. | Mitigation and prevention methods for distributed denial-of-service attacks on network servers | |
Pandey et al. | IDS CRITERIA FOR ENHANCED SECURITY OVER CLOUD. |