A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Detection of Firewall Fingerprinting and Vulnerability Prevention by Denial of Attacks on Web Application
2019
IJARCCE
Hackers / intruders exploit the firewall (host based) using malicious scripts and access the server / applications. In this project, we analyse firewall finger printing and denial of firewalling. ...
Firewalls are most important and critical devices which provides securities against all vulnerabilities. Firewall handles all the traffic in and out of the network. ...
Because firewalls are very expensive and due to privacy and legal reasons we are obligated to keep brand and model of firewall in more confidential.
II. LITERATURE SURVEY A. ...
doi:10.17148/ijarcce.2019.8254
fatcat:azz4f3wjizf4jlspbrh4lmnmfu
Countermeasure Tool - Carapace for Network Security
2011
International journal of network security and its applications
Now a day frequency of attacks on network is increased. In this, denial of services (DOS) and IP spoofing are more common. It is very difficult to find out these attacks. ...
Denial of services (DOS) and its type Distributed denial of services (DDOS) are significant problem because it is very hard to detect it. ...
This creates the opportunity for a class of attack known as a denial of service attack. ...
doi:10.5121/ijnsa.2011.3302
fatcat:33jfhbotezhcnisbwkjbspxhae
Safeguard Issues in Information Security
2016
Indian Journal of Science and Technology
attacks, denial of service attacks 4 is shown in Figure 5
Firewall A Firewall is type of network security, which can either be based on hardware or software, with a primary aim to control the ...
Alteration Attack: It involves some changes to the original message.• Denial Of Service (DOS):In this type of attack, the attacker makes an attempt to authorized users from accessing some services, which ...
doi:10.17485/ijst/2016/v9i33/98921
fatcat:iphjkhggrvdwxonmkfkiktg6qi
IP prefix hijacking detection using the collection of as characteristics
2011
2011 13th Asia-Pacific Network Operations and Management Symposium
In this paper, we present the method of collecting network fingerprints for verifying destination reachability and also propose an IP prefix hijacking detection method using the collected fingerprints. ...
By identifying the characteristics of the destination network such as network fingerprints, we can know whether the traffic reach the correct destination. ...
soBGP causes high processing overhead, and they are vulnerable to Denial of Service (DoS) attacks. ...
doi:10.1109/apnoms.2011.6077014
dblp:conf/apnoms/HongHJ11
fatcat:h4fozsom35e5fdpbvbyxviwnny
Distributed Denial of Service
2020
International Journal for Research in Applied Science and Engineering Technology
With the emergence of new technologies in this technological era the cyber world has also seen an increase in the number of attacks out of which the DDOS attack remains one of the most silent yet dangerous ...
This research paper is intended to highlight some ways in which a DDOS attack is detected and mitigated. We will also see how Machine Learning can be helpful in mitigating the DDOS attacks. ...
INTRODUCTION Distributed Denial of Service Attack (DDoS) is a type of Denial of Service (DoS) attack in which a group of malicious users or a botnet tries to bring down the resources of a company which ...
doi:10.22214/ijraset.2020.5072
fatcat:bik7bmfijvfk3gleuoumxatuea
Protocol Scrubbing: Network Security Through Transparent Flow Modification
2004
IEEE/ACM Transactions on Networking
As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks-attacks that use ambiguities to subvert detection-on passive network-based intrusion ...
This paper describes the design and implementation of protocol scrubbers. ...
Standard techniques such as watchdogs would limit the severity of such attacks. Another denial of service consideration of the TCP scrubber is the problem of preexisting connections. ...
doi:10.1109/tnet.2003.822645
fatcat:b7yzm7viejfbrfjg2tvuusam7e
The Threat from within — An Analysis of Attacks on an Internal Network
[chapter]
2002
IFIP Advances in Information and Communication Technology
The case study, which includes a denial of service attack and a worm infection, allows us to address the effectiveness of our security countermeasures and how they are affected when an incident takes place ...
Computer security, whether protecting from external or internal attacks, is a major concern with our reliance on networks for the flow of information between users and organisations. ...
There were two key benefits of this choice; a Windows 9x client would stand out in a network scan using as fingerprinting, and there are a number of known security vulnerabilities of this as compared to ...
doi:10.1007/978-0-387-35586-3_10
fatcat:wor4sswo25bgzim4wht74tloha
A Classification Of analyzed Detection and Improvement OS Fingerprinting and Various finger stamping scanning ports
2018
International Journal for Research in Applied Science and Engineering Technology
More and more analyzed for the fingerprint to use some tools like inactive and active tools. Both tools are identifying remote o/s finger stamping. ...
All scan method to client level used on SYN and server level used of SYN/ACK .and after this process to client ask to connect to the full connection to remote host. ...
The main weakness of active OS fingerprinting method is that it cannot do if the target system has firewall and intrusion detection systems (IDSs). ...
doi:10.22214/ijraset.2018.1357
fatcat:5wtbg5rjvfe3xbw7aao72qm4tm
Intrusion prevention systems
2005
ACM Ubiquity
They are signature driven and cannot protect from zero-day attacks or other denial of service type attacks. GIACE is reliant on the RADIA application push for new patches for individual workstations. ...
The events screen provides number of options for monitoring attack detection and response.Also categorizes attack levels. ...
Appendix This section includes TippingPoint device configuration pertaining to the prevention of spybot style worm attacks. ...
doi:10.1145/1071916.1071927
fatcat:aboyffv4vfdbjd55w6pywvqvne
Intrusion prevention systems
2010
Proceedings of the International Conference and Workshop on Emerging Trends in Technology - ICWET '10
They are signature driven and cannot protect from zero-day attacks or other denial of service type attacks. GIACE is reliant on the RADIA application push for new patches for individual workstations. ...
The events screen provides number of options for monitoring attack detection and response.Also categorizes attack levels. ...
Appendix This section includes TippingPoint device configuration pertaining to the prevention of spybot style worm attacks. ...
doi:10.1145/1741906.1741952
dblp:conf/icwet/NalavadeM10
fatcat:zu6foge57vhpfh7atyhcs2hwae
Intrusion Prevention Systems
[chapter]
2010
Encyclopedia of Information Assurance
They are signature driven and cannot protect from zero-day attacks or other denial of service type attacks. GIACE is reliant on the RADIA application push for new patches for individual workstations. ...
The events screen provides number of options for monitoring attack detection and response.Also categorizes attack levels. ...
Appendix This section includes TippingPoint device configuration pertaining to the prevention of spybot style worm attacks. ...
doi:10.1081/e-eia-120046295
fatcat:5zlwi5hytrbjncaccqj3eiuxxa
Securing information resources using web application firewalls
2015
Business Informatics
These mechanisms include protocol check routines, machine learning techniques, traffic signature analysis and more dedicated means, such as denial of service, XSS injection and CRRF attack prevention. ...
To ensure decent levels of traffic monitoring and intrusion prevention, web application firewalls are equipped with various mechanisms of data exchange session «normality» control. ...
and other signaturebased methods, Wallarm WAF implements behavioral fingerprinting schemes to determine the tools used in the attack [9] ). ...
doi:10.17323/1998-0663.2015.4.71.78
fatcat:gjolrarjfrc6ngl6bypjxutsi4
Intrusion Detection and Prevention Systems
[chapter]
2014
The InfoSec Handbook
Passively monitors network behavior and "detects" attacks Actively analyzes network behavior and "prevents" attacks in real-time ...
It also protects against Denial of Service attacks and Buffer overflow attacks. ...
The Intrusion and Detection System (IDS) should detect all the types of attacks, including Reconnaissance, Denial of Service (DoS)/Distributed Denial of Service (DDoS) and other network attacks, using ...
doi:10.1007/978-1-4302-6383-8_11
fatcat:vvi6zthrkvc4rpyqy2yge6p3gu
Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
2013
International Journal of Networked and Distributed Computing (IJNDC)
To capture, analyze and control attack method and tools we used a gateway. Finally, we deploy the proposed architecture and present statically analysis of attacks. ...
Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers. ...
Within this period 74.8% of the attack was denial of service. Also, the average number of IDS detected sessions in each day was 123. ...
doi:10.2991/ijndc.2013.1.2.5
fatcat:uq3nbohlmfcrrdo5xradfksrra
Real-Time Emulation of Intrusion Victim in HoneyFarm
[chapter]
2004
Lecture Notes in Computer Science
This method provides hackers with a less suspicious environment and reduces the risk of harming other systems. ...
Additionally, the main concern is that if hackers were allowed outbound connections, they may attack the actual servers thus the honeypot could become a facilitator of the hacking crime. ...
China and the Internet Security project of PrivyLink International Limited (Singapore). ...
doi:10.1007/978-3-540-30483-8_18
fatcat:yuqtigu5rvg6ddgzwlkdksemmq
« Previous
Showing results 1 — 15 out of 1,768 results