Kaskar et al., 2014 - Google Patents
A system for detection of distributed denial of service (DDoS) attacks using KDD cup data setKaskar et al., 2014
View PDF- Document ID
- 3906854486070611742
- Author
- Kaskar J
- Bhatt R
- Shirsath R
- Publication year
- Publication venue
- IJCSIT) International Journal of Computer Science and Information Technologies
External Links
Snippet
Distributed denial-of-service (DDoS) attacks are a major security threat, the prevention of which is very hard, like when it comes to highly distributed daemon-based attacks. The early discovery of these attacks, although difficult, is necessary to protect network resources as …
- 238000001514 detection method 0 title abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10855700B1 (en) | Post-intrusion detection of cyber-attacks during lateral movement within networks | |
Ghafir et al. | Botdet: A system for real time botnet command and control traffic detection | |
US9866566B2 (en) | Systems and methods for detecting and reacting to malicious activity in computer networks | |
Cazorla et al. | Cyber stealth attacks in critical information infrastructures | |
Ho et al. | Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems | |
US8640234B2 (en) | Method and apparatus for predictive and actual intrusion detection on a network | |
US20170324758A1 (en) | Detecting and reacting to malicious activity in decrypted application data | |
CN113660224B (en) | Situation awareness defense method, device and system based on network vulnerability scanning | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
CN113411295A (en) | Role-based access control situation awareness defense method and system | |
CN113411297A (en) | Situation awareness defense method and system based on attribute access control | |
CN113660222A (en) | Situation awareness defense method and system based on mandatory access control | |
Neu et al. | An approach for detecting encrypted insider attacks on OpenFlow SDN Networks | |
Jakić | The overview of intrusion detection system methods and techniques | |
Rahim et al. | Improving the security of internet of things (iot) using intrusion detection system (ids) | |
Kaskar et al. | A system for detection of distributed denial of service (DDoS) attacks using KDD cup data set | |
Kishore et al. | Intrusion detection system a need | |
Kfouri et al. | Design of a Distributed HIDS for IoT Backbone Components. | |
Hossain et al. | Improving security practices in health information systems with STRIDE threat modeling | |
Khanday et al. | Intrusion Detection Systems for Trending Cyberattacks | |
US20240250968A1 (en) | Detecting scanning and attacking uniform resource locators in network traffic | |
Verwoerd | Active network security | |
Nayak | Research on application of intrusion detection system in data mining | |
Soriano | Information and network security | |
Briain | Access Control |