Ojo, 2013 - Google Patents
Internet Traffic Monitoring: Case Study: The Network of Granlund OyOjo, 2013
View PDF- Document ID
- 17120639340766999569
- Author
- Ojo G
- Publication year
External Links
Snippet
The goal of this final year project was to design, implement, and analyse the results of Internet traffic monitoring processes using the network of Granlund Oy as a case study. The main motivation behind the topic was to provide a concise analysis of the Internet traf-fic of a …
- 238000000034 method 0 abstract description 27
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230362189A1 (en) | System and method for strategic anti-malware monitoring | |
| JP7250703B2 (en) | Assessment and remediation of correlation-driven threats | |
| AU2003222180B2 (en) | System and method for detecting an infective element in a network environment | |
| EP1817685B1 (en) | Intrusion detection in a data center environment | |
| US8230505B1 (en) | Method for cooperative intrusion prevention through collaborative inference | |
| US20110231935A1 (en) | System and method for passively identifying encrypted and interactive network sessions | |
| CN111295640B (en) | Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation | |
| Alabady | Design and Implementation of a Network Security Model for Cooperative Network. | |
| Scarfone et al. | Intrusion detection and prevention systems | |
| Khari et al. | Meticulous study of firewall using security detection tools | |
| Ojo | Internet Traffic Monitoring: Case Study: The Network of Granlund Oy | |
| Kamal et al. | Analysis of network communication attacks | |
| Karamagi | Comptia Security+ Practice Exams | |
| US12483573B2 (en) | Detecting scanning and attacking uniform resource locators in network traffic | |
| Berger-Sabbatel et al. | Architecture of a platform for malware analysis and confinement | |
| Biswas et al. | Network Forensics Analysis | |
| Singh et al. | Communication based vulnerabilities and script based solvabilities | |
| Sulaman | An Analysis and Comparison of The Security Features of Firewalls and IDSs | |
| Patel et al. | IJDI-ERET | |
| Singh et al. | Vulnerabilities of Electronics Communication: solution mechanism through script | |
| Venuti et al. | Deliverable DJ2. 4.1: Specification of Advanced Methods for Incident and Security Threats' Detection and Mitigation in a Multi-Domain Environment | |
| Thangavel et al. | Sniffers Over Cloud Environment: A Literature Survey | |
| MS17902830 | A Distributed Defense System that Features Hybrid Intelligent IDS to Mitigate Network Layer DDoS Attacks | |
| Τριαντοπούλου | An experimental analysis of current DDoS attacks based on a provider edge router honeynet | |
| Ibitola et al. | Analysis of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware |