Movatterモバイル変換


[0]ホーム

URL:


Erkat, 2008 - Google Patents

Defence system modelling against computer worms

Erkat, 2008

Document ID
10932429677261149453
Author
Erkat E
Publication year
Publication venue
PQDT-Global

External Links

Snippet

As computer networks become prevalent, the Internet has been a battlefield for attackers and defenders. One of the most powerful weapons for attackers is the computer worm. Computer worms are a self-propagating computer program that is being increasingly and …
Continue reading atsearch.proquest.com (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

PublicationPublication DateTitle
Almutairi et al.Hybrid botnet detection based on host and network analysis
Caswell et al.Snort intrusion detection and prevention toolkit
ZimbaMalware-free intrusion: a novel approach to ransomware infection vectors
Goebel et al.Measurement and analysis of autonomous spreading malware in a university environment
Dutta et al.Intrusion detection systems fundamentals
Antonatos et al.Puppetnets: Misusing web browsers as a distributed attack infrastructure
BlackwellRamit-Rule-Based Alert Management Information Tool
Bansal et al.Analysis and Detection of various DDoS attacks on Internet of Things Network
MoyaAnalysis and evaluation of the snort and bro network intrusion detection systems
EversonCyber attack surface mapping for offensive security testing
MonteiroHow intrusion detection can improve software decoy applications
ErkatDefence system modelling against computer worms
GanganagariDefining Best Practices to Prevent Zero-Day and Polymorphic Attacks
Fu et al.Camouflaging virtual honeypots
Cheetancheri et al.Modelling a computer worm defense system
Bakos et al.Ubiquitous Redirection as Access Control Response.
FrederickTesting a low-interaction honeypot against live cyber attackers
Carlson et al.Intrusion detection and prevention systems
HudsonAn analysis of botnet vulnerabilities
Zafar et al.Network security: a survey of modern approaches
BaskervilleIntrusion prevention systems: How do they prevent intrusion?
Verma et al.Automated multilevel defence model to investigate packets for web interface
Le et al.Performance evaluation of cyber reconnaissance tools
McGrewExploring extensions of traditional honeypot systems and testing the impact on attack profiling
ParkAcquiring Digital Evidence from Botnet Attacks: Procedures and Methods

[8]
ページ先頭

©2009-2025 Movatter.jp