Nothing Special   »   [go: up one dir, main page]

Patel et al., 2023 - Google Patents

A Snort-based secure edge router for smart home

Patel et al., 2023

Document ID
10306961108536218387
Author
Patel N
Mehtre B
Wankar R
Publication year
Publication venue
International Journal of Sensor Networks

External Links

Snippet

Cybercrimes are rising rapidly with the increasing use of the internet of things (IoT)-based gadgets at home. For instance, the Mirai-BotNet infected and compromised many IoT-based devices and routers, creating a zombie network of robots that can be controlled remotely …
Continue reading at www.inderscienceonline.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering

Similar Documents

Publication Publication Date Title
Habibi et al. Heimdall: Mitigating the internet of insecure things
Al-Duwairi et al. SIEM-based detection and mitigation of IoT-botnet DDoS attacks
Bringer et al. A survey: Recent advances and future trends in honeypot research
Aamir et al. A survey on DDoS attack and defense strategies: from traditional schemes to current techniques
Agrawal et al. The performance analysis of honeypot based intrusion detection system for wireless network
Hindy et al. A taxonomy of malicious traffic for intrusion detection systems
Agrawal et al. Wireless rogue access point detection using shadow honeynet
Mandal et al. A survey on network security tools for open source
Dua et al. Iisr: A secure router for iot networks
CN111295640A (en) Fine-grained firewall policy enforcement using session APP ID and endpoint process ID correlation
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Bdair et al. Brief of intrusion detection systems in detecting ICMPv6 attacks
Sajjad et al. UCAM: usage, communication and access monitoring based detection system for IoT botnets
Pavithirakini et al. Improve the Capabilities of Wireshark as a tool for Intrusion Detection in DOS Attacks
Patel et al. A Snort-based secure edge router for smart home
Wibowo et al. Smart Home Security Analysis Using Arduino Based Virtual Private Network
Nagesh et al. A survey on denial of service attacks and preclusions
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Khurana A security approach to prevent ARP poisoning and defensive tools
Stiawan et al. Penetration testing and network auditing: Linux
Mantoo et al. A machine learning model for detection of man in the middle attack over unsecured devices
Sulieman et al. Detecting zero-day polymorphic worm: A review
Nigam et al. Man-in-the-middle-attack and proposed algorithm for detection
Patel et al. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.
Rai et al. Intrusion detection systems: A review