Patel et al., 2023 - Google Patents
A Snort-based secure edge router for smart homePatel et al., 2023
- Document ID
- 10306961108536218387
- Author
- Patel N
- Mehtre B
- Wankar R
- Publication year
- Publication venue
- International Journal of Sensor Networks
External Links
Snippet
Cybercrimes are rising rapidly with the increasing use of the internet of things (IoT)-based gadgets at home. For instance, the Mirai-BotNet infected and compromised many IoT-based devices and routers, creating a zombie network of robots that can be controlled remotely …
- 230000001010 compromised 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Habibi et al. | Heimdall: Mitigating the internet of insecure things | |
Al-Duwairi et al. | SIEM-based detection and mitigation of IoT-botnet DDoS attacks | |
Bringer et al. | A survey: Recent advances and future trends in honeypot research | |
Aamir et al. | A survey on DDoS attack and defense strategies: from traditional schemes to current techniques | |
Agrawal et al. | The performance analysis of honeypot based intrusion detection system for wireless network | |
Hindy et al. | A taxonomy of malicious traffic for intrusion detection systems | |
Agrawal et al. | Wireless rogue access point detection using shadow honeynet | |
Mandal et al. | A survey on network security tools for open source | |
Dua et al. | Iisr: A secure router for iot networks | |
CN111295640A (en) | Fine-grained firewall policy enforcement using session APP ID and endpoint process ID correlation | |
Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
Bdair et al. | Brief of intrusion detection systems in detecting ICMPv6 attacks | |
Sajjad et al. | UCAM: usage, communication and access monitoring based detection system for IoT botnets | |
Pavithirakini et al. | Improve the Capabilities of Wireshark as a tool for Intrusion Detection in DOS Attacks | |
Patel et al. | A Snort-based secure edge router for smart home | |
Wibowo et al. | Smart Home Security Analysis Using Arduino Based Virtual Private Network | |
Nagesh et al. | A survey on denial of service attacks and preclusions | |
Simkhada et al. | Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review | |
Khurana | A security approach to prevent ARP poisoning and defensive tools | |
Stiawan et al. | Penetration testing and network auditing: Linux | |
Mantoo et al. | A machine learning model for detection of man in the middle attack over unsecured devices | |
Sulieman et al. | Detecting zero-day polymorphic worm: A review | |
Nigam et al. | Man-in-the-middle-attack and proposed algorithm for detection | |
Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. | |
Rai et al. | Intrusion detection systems: A review |