scispace - formally typeset
Topic

Network security

About: Network security is a(n) research topic. Over the lifetime, 23926 publication(s) have been published within this topic receiving 349529 citation(s). The topic is also known as: netsec & computer network security.

...read more

Papers
More filters

Proceedings Article
Martin Roesch1Institutions (1)
12 Nov 1999-
TL;DR: Snort provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected.

...read more

Abstract: Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Commercial NIDS have many differences, but Information Systems departments must face the commonalities that they share such as significant system footprint, complex deployment and high monetary cost. Snort was designed to address these issues.

...read more

3,388 citations


Book
01 Jun 1998-

2,623 citations


Journal ArticleDOI
TL;DR: This work compares and discusses design choices and features of proposed ICN architectures, focusing on the following main components: named data objects, naming and security, API, routing and transport, and caching.

...read more

Abstract: The information-centric networking (ICN) concept is a significant common approach of several future Internet research activities. The approach leverages in-network caching, multiparty communication through replication, and interaction models decoupling senders and receivers. The goal is to provide a network infrastructure service that is better suited to today?s use (in particular. content distribution and mobility) and more resilient to disruptions and failures. The ICN approach is being explored by a number of research projects. We compare and discuss design choices and features of proposed ICN architectures, focusing on the following main components: named data objects, naming and security, API, routing and transport, and caching. We also discuss the advantages of the ICN approach in general.

...read more

1,545 citations


Journal ArticleDOI
TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.

...read more

Abstract: The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In this context, anomaly-based network intrusion detection techniques are a valuable technology to protect target systems and networks against malicious activities. However, despite the variety of such methods described in the literature in recent years, security tools incorporating anomaly detection functionalities are just starting to appear, and several important problems remain to be solved. This paper begins with a review of the most well-known anomaly-based intrusion detection techniques. Then, available platforms, systems under development and research projects in the area are presented. Finally, we outline the main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues.

...read more

1,483 citations


Patent
29 Oct 2007-
Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.

...read more

1,428 citations


Network Information
Related Topics (5)
Intrusion detection system

28.4K papers, 509.5K citations

94% related
Authentication

74.7K papers, 867.1K citations

93% related
Cloud computing security

27.1K papers, 511.8K citations

93% related
Computer security model

18.1K papers, 352.9K citations

93% related
Access control

32.6K papers, 475K citations

93% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202233
20211,009
20201,553
20191,740
20181,545
20171,342

Top Attributes

Show by:

Topic's top 5 most impactful authors

Ehab Al-Shaer

32 papers, 1.5K citations

Sushil Jajodia

24 papers, 1.6K citations

Wojciech Mazurczyk

16 papers, 207 citations

Zheng Yan

15 papers, 408 citations

Emilio Corchado

13 papers, 319 citations