[go: up one dir, main page]

Chen, 2006 - Google Patents

Towards End-to-End Security

Chen, 2006

Document ID
7072953497658231146
Author
Chen T
Publication year
Publication venue
Network Management and Security

External Links

Snippet

The Internet has been invaluable for facilitating the Web, email, file sharing, and other communications services that we use every day. Unfortunately, the past few years of major virus and worm epidemics have demonstrated that ubiqui-tous Internet connectivity has a …
Continue reading at books.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
US10230761B1 (en) Method and system for detecting network compromise
US7653941B2 (en) System and method for detecting an infective element in a network environment
US7984493B2 (en) DNS based enforcement for confinement and detection of network malicious activities
US9628508B2 (en) Discovery of suspect IP addresses
US7225468B2 (en) Methods and apparatus for computer network security using intrusion detection and prevention
Marinova-Boncheva A short survey of intrusion detection systems
CN101399786A (en) Method, apparatus and system for network safe transmission
CN116566654A (en) Protection system for block chain management server
van Oorschot Intrusion detection and network-based attacks
Kantheti et al. Performance and evaluation of firewalls and security
Antrosiom et al. Malware defense using network security authentication
Hooper An intelligent detection and response strategy to false positives and network attacks
Chen Towards End-to-End Security
Annuar et al. Enhancement and implementation of network access control architecture for virtualization environments
Keromytis et al. Designing firewalls: A survey
bin Baharin et al. Third party security audit procedure for network environment
Karamagi Comptia Security+ Practice Exams
Hashmi et al. Intrusion Prevention System based Defence Techniques to manage DDoS Attacks
Hooper Intelligent autonomic strategy to attacks in network infrastructure protection: Feedback methods to IDS, using policies, alert filters and firewall packet filters for multiple protocols
Masalawalaa et al. Comprehensive scrutiny of threat vectors leading to attacks in ICS
Shaikh et al. Disarming firewall
Asarcıklı Firewall monitoring using intrusion detection systems
Parker et al. Host Security
Mohammed Cybercafé Systems Security
Saxena Network Intrusion Prevention System Techniques to Manage DDOS Attacks