Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,768 Hits in 3.5 sec

Detection of Firewall Fingerprinting and Vulnerability Prevention by Denial of Attacks on Web Application

Dilli Babu M, Balamani M, Mukesh G
2019 IJARCCE  
Hackers / intruders exploit the firewall (host based) using malicious scripts and access the server / applications. In this project, we analyse firewall finger printing and denial of firewalling.  ...  Firewalls are most important and critical devices which provides securities against all vulnerabilities. Firewall handles all the traffic in and out of the network.  ...  Because firewalls are very expensive and due to privacy and legal reasons we are obligated to keep brand and model of firewall in more confidential. II. LITERATURE SURVEY A.  ... 
doi:10.17148/ijarcce.2019.8254 fatcat:azz4f3wjizf4jlspbrh4lmnmfu

Countermeasure Tool - Carapace for Network Security

Anand Bisen, Shrinivas Karwa, B.B Meshram
2011 International journal of network security and its applications  
Now a day frequency of attacks on network is increased. In this, denial of services (DOS) and IP spoofing are more common. It is very difficult to find out these attacks.  ...  Denial of services (DOS) and its type Distributed denial of services (DDOS) are significant problem because it is very hard to detect it.  ...  This creates the opportunity for a class of attack known as a denial of service attack.  ... 
doi:10.5121/ijnsa.2011.3302 fatcat:33jfhbotezhcnisbwkjbspxhae

Safeguard Issues in Information Security

Ashwani Kumar, Ayush Sharma, Priyanka Mehta
2016 Indian Journal of Science and Technology  
attacks, denial of service attacks 4 is shown in Figure 5 Firewall A Firewall is type of network security, which can either be based on hardware or software, with a primary aim to control the  ...  Alteration Attack: It involves some changes to the original message.• Denial Of Service (DOS):In this type of attack, the attacker makes an attempt to authorized users from accessing some services, which  ... 
doi:10.17485/ijst/2016/v9i33/98921 fatcat:iphjkhggrvdwxonmkfkiktg6qi

IP prefix hijacking detection using the collection of as characteristics

Seong-Cheol Hong, James Won-Ki Hong, Hongtaek Ju
2011 2011 13th Asia-Pacific Network Operations and Management Symposium  
In this paper, we present the method of collecting network fingerprints for verifying destination reachability and also propose an IP prefix hijacking detection method using the collected fingerprints.  ...  By identifying the characteristics of the destination network such as network fingerprints, we can know whether the traffic reach the correct destination.  ...  soBGP causes high processing overhead, and they are vulnerable to Denial of Service (DoS) attacks.  ... 
doi:10.1109/apnoms.2011.6077014 dblp:conf/apnoms/HongHJ11 fatcat:h4fozsom35e5fdpbvbyxviwnny

Distributed Denial of Service

Kushagra Yadav
2020 International Journal for Research in Applied Science and Engineering Technology  
With the emergence of new technologies in this technological era the cyber world has also seen an increase in the number of attacks out of which the DDOS attack remains one of the most silent yet dangerous  ...  This research paper is intended to highlight some ways in which a DDOS attack is detected and mitigated. We will also see how Machine Learning can be helpful in mitigating the DDOS attacks.  ...  INTRODUCTION Distributed Denial of Service Attack (DDoS) is a type of Denial of Service (DoS) attack in which a group of malicious users or a botnet tries to bring down the resources of a company which  ... 
doi:10.22214/ijraset.2020.5072 fatcat:bik7bmfijvfk3gleuoumxatuea

Protocol Scrubbing: Network Security Through Transparent Flow Modification

D. Watson, M. Smart, G.R. Malan, F. Jahanian
2004 IEEE/ACM Transactions on Networking  
As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks-attacks that use ambiguities to subvert detection-on passive network-based intrusion  ...  This paper describes the design and implementation of protocol scrubbers.  ...  Standard techniques such as watchdogs would limit the severity of such attacks. Another denial of service consideration of the TCP scrubber is the problem of preexisting connections.  ... 
doi:10.1109/tnet.2003.822645 fatcat:b7yzm7viejfbrfjg2tvuusam7e

The Threat from within — An Analysis of Attacks on an Internal Network [chapter]

John Haggerty, Qi Shi, Madjid Merabti
2002 IFIP Advances in Information and Communication Technology  
The case study, which includes a denial of service attack and a worm infection, allows us to address the effectiveness of our security countermeasures and how they are affected when an incident takes place  ...  Computer security, whether protecting from external or internal attacks, is a major concern with our reliance on networks for the flow of information between users and organisations.  ...  There were two key benefits of this choice; a Windows 9x client would stand out in a network scan using as fingerprinting, and there are a number of known security vulnerabilities of this as compared to  ... 
doi:10.1007/978-0-387-35586-3_10 fatcat:wor4sswo25bgzim4wht74tloha

A Classification Of analyzed Detection and Improvement OS Fingerprinting and Various finger stamping scanning ports

Nitin Tiwari
2018 International Journal for Research in Applied Science and Engineering Technology  
More and more analyzed for the fingerprint to use some tools like inactive and active tools. Both tools are identifying remote o/s finger stamping.  ...  All scan method to client level used on SYN and server level used of SYN/ACK .and after this process to client ask to connect to the full connection to remote host.  ...  The main weakness of active OS fingerprinting method is that it cannot do if the target system has firewall and intrusion detection systems (IDSs).  ... 
doi:10.22214/ijraset.2018.1357 fatcat:5wtbg5rjvfe3xbw7aao72qm4tm

Intrusion prevention systems

Nick Ierace, Cesar Urrutia, Richard Bassett
2005 ACM Ubiquity  
They are signature driven and cannot protect from zero-day attacks or other denial of service type attacks. GIACE is reliant on the RADIA application push for new patches for individual workstations.  ...  The events screen provides number of options for monitoring attack detection and response.Also categorizes attack levels.  ...  Appendix This section includes TippingPoint device configuration pertaining to the prevention of spybot style worm attacks.  ... 
doi:10.1145/1071916.1071927 fatcat:aboyffv4vfdbjd55w6pywvqvne

Intrusion prevention systems

K. C. Nalavade, B. B. Meshram
2010 Proceedings of the International Conference and Workshop on Emerging Trends in Technology - ICWET '10  
They are signature driven and cannot protect from zero-day attacks or other denial of service type attacks. GIACE is reliant on the RADIA application push for new patches for individual workstations.  ...  The events screen provides number of options for monitoring attack detection and response.Also categorizes attack levels.  ...  Appendix This section includes TippingPoint device configuration pertaining to the prevention of spybot style worm attacks.  ... 
doi:10.1145/1741906.1741952 dblp:conf/icwet/NalavadeM10 fatcat:zu6foge57vhpfh7atyhcs2hwae

Intrusion Prevention Systems [chapter]

Gildas A. Deograt-Lumy, Ray Haldo
2010 Encyclopedia of Information Assurance  
They are signature driven and cannot protect from zero-day attacks or other denial of service type attacks. GIACE is reliant on the RADIA application push for new patches for individual workstations.  ...  The events screen provides number of options for monitoring attack detection and response.Also categorizes attack levels.  ...  Appendix This section includes TippingPoint device configuration pertaining to the prevention of spybot style worm attacks.  ... 
doi:10.1081/e-eia-120046295 fatcat:5zlwi5hytrbjncaccqj3eiuxxa

Securing information resources using web application firewalls

Petr Baranov, Eldar Beybutov
2015 Business Informatics  
These mechanisms include protocol check routines, machine learning techniques, traffic signature analysis and more dedicated means, such as denial of service, XSS injection and CRRF attack prevention.  ...  To ensure decent levels of traffic monitoring and intrusion prevention, web application firewalls are equipped with various mechanisms of data exchange session «normality» control.  ...  and other signaturebased methods, Wallarm WAF implements behavioral fingerprinting schemes to determine the tools used in the attack [9] ).  ... 
doi:10.17323/1998-0663.2015.4.71.78 fatcat:gjolrarjfrc6ngl6bypjxutsi4

Intrusion Detection and Prevention Systems [chapter]

Umesh Hodeghatta Rao, Umesha Nayak
2014 The InfoSec Handbook  
Passively monitors network behavior and "detects" attacks Actively analyzes network behavior and "prevents" attacks in real-time  ...  It also protects against Denial of Service attacks and Buffer overflow attacks.  ...  The Intrusion and Detection System (IDS) should detect all the types of attacks, including Reconnaissance, Denial of Service (DoS)/Distributed Denial of Service (DDoS) and other network attacks, using  ... 
doi:10.1007/978-1-4302-6383-8_11 fatcat:vvi6zthrkvc4rpyqy2yge6p3gu

Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis

Yonas Kibret, Wang Yong
2013 International Journal of Networked and Distributed Computing (IJNDC)  
To capture, analyze and control attack method and tools we used a gateway. Finally, we deploy the proposed architecture and present statically analysis of attacks.  ...  Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers.  ...  Within this period 74.8% of the attack was denial of service. Also, the average number of IDS detected sessions in each day was 123.  ... 
doi:10.2991/ijndc.2013.1.2.5 fatcat:uq3nbohlmfcrrdo5xradfksrra

Real-Time Emulation of Intrusion Victim in HoneyFarm [chapter]

Xing-Yun He, Kwok-Yan Lam, Siu-Leung Chung, Chi-Hung Chi, Jia-Guang Sun
2004 Lecture Notes in Computer Science  
This method provides hackers with a less suspicious environment and reduces the risk of harming other systems.  ...  Additionally, the main concern is that if hackers were allowed outbound connections, they may attack the actual servers thus the honeypot could become a facilitator of the hacking crime.  ...  China and the Internet Security project of PrivyLink International Limited (Singapore).  ... 
doi:10.1007/978-3-540-30483-8_18 fatcat:yuqtigu5rvg6ddgzwlkdksemmq
« Previous Showing results 1 — 15 out of 1,768 results