Movatterモバイル変換


[0]ホーム

URL:


Cajes - Google Patents

The Future of IoT Security: Defending Against DDoS Attack

Cajes

ViewHTML
Document ID
6253479020967530814
Author
Cajes N

External Links

Snippet

The continuous development of Internet of Things (IoT have exposed some important vulnerabilities, specifically in defending against the sophisticated DDoS attack. DDoS can successfully target IoT devices and make services unavailable which results in financial …
Continue reading atinsights2techinfo.com (HTML) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

PublicationPublication DateTitle
Jain et al.A survey of phishing attack techniques, defence mechanisms and open research challenges
US9060017B2 (en)System for detecting, analyzing, and controlling infiltration of computer and network systems
US8356001B2 (en)Systems and methods for application-level security
Neupane et al.Impacts and risk of generative AI technology on cyber defense
Veprytska et al.AI powered attacks against AI powered protection: classification, scenarios and risk analysis
Birthriya et al.A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
Sathya et al.Reinforcing cyber world security with deep learning approaches
Pandhurnekar et al.Proposed method for threat detection using user behavior analysis
Abubaker et al.Social engineering in social network: a systematic literature review
Munir et al.Detection, mitigation and quantitative security risk assessment of invisible attacks at enterprise network
Butkar et al.Crime Risk Forecasting using Cyber Security and Artificial Intelligent
RahamanThe Anatomy of a Smishing Attack: Common Techniques and Tactics Used by Cybercriminals
Hu et al.A Novel Attack‐and‐Defense Signaling Game for Optimal Deceptive Defense Strategy Choice
Khansadurai et al.Crime Rate Prediction using Cyber Security and Artificial Intelligent
CajesThe Future of IoT Security: Defending Against DDoS Attack
WangMitigating phishing threats
Kissoon et al.An Analysis of Key Tools for Detecting Cross-Site Scripting Attacks on Web-Based Systems
AryaThe Evolution of Phishing Attacks How Machine Learning Keeps Up
Raghvin et al.Trust factor validation for distributed denial of service attack detection using machine learning
Kiriakidis et al.Building a Use Case-Driven Adversarial Threat Matrix: A Comprehensive Approach
Roy et al.Real-time XSS Vulnerability Detection
Khan et al.What is Mobile Phishing and How to Detect it
ChuenchujitA taxonomy of phishing research
WanProtecting web contents against persistent crawlers
Sait et al.A Survey on Techniques to Detect Malicious Activites on Web

[8]
ページ先頭

©2009-2025 Movatter.jp