Detecting Network Attacks in the Internet via Statistical Network Traffic Normality Prediction
Journal of Network and Systems Management
ACM SIGCOMM Computer Communication Review
Collaborative Internet Worm Containment
IEEE Security and Privacy
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
New architecture for intra-domain network security issues
Communications of the ACM - Entertainment networking
Information sharing for distributed intrusion detection systems
Journal of Network and Computer Applications
Network intrusion detection in covariance feature space
Pattern Recognition
The detection of malicious misrouting of packets on internet
PDCN'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: parallel and distributed computing and networks
Collaborative Detection of DDoS Attacks over Multiple Network Domains
IEEE Transactions on Parallel and Distributed Systems
Record path header for triangle routing attacks in IPv6 networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Network security simulation and evaluation
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
Record path header for triangle routing attacks in IPv6 networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
Information Systems Research
Information fusion for computer security: State of the art and open issues
Information Fusion
Operational fault detection in network infrastructure
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
P2P attack taxonomy and relationship analysis
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Detecting distributed denial of service attacks by sharing distributed beliefs
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Impacts of web systems on their domain
Journal of Web Engineering
Trusted computing architectures for a mobile IT infrastructure
Proceedings of the 39th annual ACM SIGUCCS conference on User services
Attack resiliency of network topologies
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Performance analysis of dynamic host isolation system in wireless mobile networks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Addressing malicious code in COTS: a protection framework
ICCBSS'05 Proceedings of the 4th international conference on COTS-Based Software Systems
An extensible pattern-based library and taxonomy of security threats for distributed systems
Computer Standards & Interfaces
Information security strategies: towards an organizational multi-strategy perspective
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
The pervasive and ubiquitous nature of the Internet coupled with growing concerns about cyber terrorism demand immediate solutions for securing the Internet infrastructure. So far, the research in Internet security primarily focused on. securing the information rather than securing the infrastructure itself. Given the prevailing threat situation, there is a compelling need to develop architectures, algorithms, and protocols to realize a dependable Internet infrastructure. In order to achieve this goal, the first and foremost step is to develop a comprehensive understanding of the security threats and existing solutions. This article attempts to fulfill this important step by providing a taxonomy of security attacks, which are classified into four main categories: DNS hacking, routing table poisoning, packet mistreatment, and denial-of-service attacks. The article discusses the existing solutions for each of these categories, and also outlines a methodology for developing secure protocols.