Lammatha - Google Patents
Intrusion Detection SystemLammatha
View PDF- Document ID
- 11638411747932858927
- Author
- Lammatha K
External Links
Snippet
Computer networks bring us not only the benefits, such as more computing power and better performance for a given price, but also some challenges and risks, especially in the field of system security. During the past two decades, significant effort has been put into network …
- 238000001514 detection method 0 title abstract description 35
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Harris et al. | TCP/IP security threats and attack methods | |
US7313618B2 (en) | Network architecture using firewalls | |
Gupta et al. | Defending against distributed denial of service attacks: issues and challenges | |
EP2555486B1 (en) | Multi-method gateway-based network security systems and methods | |
US7472414B2 (en) | Method of processing data traffic at a firewall | |
Bellovin | A look back at" security problems in the tcp/ip protocol suite | |
CA2548336A1 (en) | Upper-level protocol authentication | |
Forte et al. | SecSyslog: An approach to secure logging based on covert channels | |
Pandey et al. | Attacks & defense mechanisms for TCP/IP based protocols | |
Wang et al. | Using web-referral architectures to mitigate denial-of-service threats | |
Lammatha | Intrusion Detection System | |
Yang | Introduction to TCP/IP network attacks | |
Singh et al. | Intrusion detection system and its variations | |
Pandey et al. | Comprehensive security mechanism for defending cyber attacks based upon spoofing and poisoning | |
Verwoerd et al. | Security architecture testing using IDS—a case study | |
Brooks et al. | What is DDoS? | |
Wang et al. | Wraps: Denial-of-service defense through web referrals | |
Stopforth | Techniques and countermeasures of TCP/IP OS fingerprinting on Linux Systems | |
Alzobi | Extensive Penetration Testing to Secure Network Devices | |
Qureshi | Network intrusion detection using an innovative statistical approach | |
Nakato | Networks security: attacks and defense mechanism by designing an intelligent firewall agent | |
Yang | A real time packet filtering module for network intrusion detection system | |
PRICE et al. | Network security mechanisms utilizing dynamic network address translation ldrd project | |
Hutchinson | Study of Denial of Service | |
Pavithra et al. | A Comprehensive Study on Distributed Denial of Service Attacks and Defense Mechanisms |