2017 International Conference on Intelligent Computing and Control Systems (ICICCS) 2017
DOI: 10.1109/iccons.2017.8250515
|View full text |Cite
|
Sign up to set email alerts
|

Detection of DoS attack and zero day threat with SIEM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…General prototype of a Network: Models, network architecture and services that protect information from the following references [11], [14], [30] and [39] were considered; Server protection was decided as they do in [32], [33] and [34] to continue providing services offered by an organization through its applications.…”
Section: Methodology To Generate Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…General prototype of a Network: Models, network architecture and services that protect information from the following references [11], [14], [30] and [39] were considered; Server protection was decided as they do in [32], [33] and [34] to continue providing services offered by an organization through its applications.…”
Section: Methodology To Generate Resultsmentioning
confidence: 99%
“…• The proposed research is related to the results with the following references: in [8] a management and monitoring architecture was defined through software to filter attacks; in [9] an algorithm of classification of the characteristics in the attacks was used; in [21] security levels were defined to prevent attacks; in [22] a set of policies for storage and data security was applied; in [27] a package registration procedure was used to minimize the denial of service in the network; in [29] the application of security policy and user control was used; in [30] an attack mitigation algorithm was used when entering ip addresses and invalid requests; in [32] the detection of attacks in the request and delivery messages was analyzed; in [33] and [34] they defined an architecture to detect attacks on the server and analysis of network traffic; in [37] analyzed a responsibility approach and rules to minimize individual and community risks; in [39] a security policy was applied to computer equipment.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Malware attackers can choose different targets or cyber-physical devices and attack them like mobile devices and connected vehicles. Many of the targets the threat actor attack are susceptible to malware attacks due to mismanagement issues, poor patching behaviors, and dangerous 0-day attacks [16].…”
Section: Related Workmentioning
confidence: 99%
“…Many of the targets the threat actor attack are susceptible to malware attacks due to mismanagement issues, poor patching behaviors, and dangerous 0-day attacks. 4 To differentiate DGA domain names from normal domain names, researchers have discovered that DGA-generated domain names contain significant features. 5 Therefore, many studies aim to target blocking those DGA domain names as a defense approach.…”
Section: Related Workmentioning
confidence: 99%