Chen, 2006 - Google Patents
Towards End-to-End SecurityChen, 2006
- Document ID
- 7072953497658231146
- Author
- Chen T
- Publication year
- Publication venue
- Network Management and Security
External Links
Snippet
The Internet has been invaluable for facilitating the Web, email, file sharing, and other communications services that we use every day. Unfortunately, the past few years of major virus and worm epidemics have demonstrated that ubiqui-tous Internet connectivity has a …
- 230000001965 increased 0 abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10230761B1 (en) | Method and system for detecting network compromise | |
| US7653941B2 (en) | System and method for detecting an infective element in a network environment | |
| US7984493B2 (en) | DNS based enforcement for confinement and detection of network malicious activities | |
| US9628508B2 (en) | Discovery of suspect IP addresses | |
| US7225468B2 (en) | Methods and apparatus for computer network security using intrusion detection and prevention | |
| Marinova-Boncheva | A short survey of intrusion detection systems | |
| CN101399786A (en) | Method, apparatus and system for network safe transmission | |
| CN116566654A (en) | Protection system for block chain management server | |
| van Oorschot | Intrusion detection and network-based attacks | |
| Kantheti et al. | Performance and evaluation of firewalls and security | |
| Antrosiom et al. | Malware defense using network security authentication | |
| Hooper | An intelligent detection and response strategy to false positives and network attacks | |
| Chen | Towards End-to-End Security | |
| Annuar et al. | Enhancement and implementation of network access control architecture for virtualization environments | |
| Keromytis et al. | Designing firewalls: A survey | |
| bin Baharin et al. | Third party security audit procedure for network environment | |
| Karamagi | Comptia Security+ Practice Exams | |
| Hashmi et al. | Intrusion Prevention System based Defence Techniques to manage DDoS Attacks | |
| Hooper | Intelligent autonomic strategy to attacks in network infrastructure protection: Feedback methods to IDS, using policies, alert filters and firewall packet filters for multiple protocols | |
| Masalawalaa et al. | Comprehensive scrutiny of threat vectors leading to attacks in ICS | |
| Shaikh et al. | Disarming firewall | |
| Asarcıklı | Firewall monitoring using intrusion detection systems | |
| Parker et al. | Host Security | |
| Mohammed | Cybercafé Systems Security | |
| Saxena | Network Intrusion Prevention System Techniques to Manage DDOS Attacks |