Network security elements using endpoint resources

作者: Uri Blumenthal , Omer Ben-Shalom

DOI:

关键词: Network Access DeviceComputer securityCommunication endpointNetwork Admission ControlComputer networkNetwork management stationNetwork securityNetwork Access ControlComputer science

摘要: A method and apparatus for network security elements using endpoint resources. An embodiment of a includes receiving request access to at an server. The further detecting that the is unauthorized. directed element.

参考文章(35)
Thorsten Holz, Learning More About Attack Patterns With Honeypots Sicherheit. pp. 30- 41 ,(2006)
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Worm Detection Using Local Networks Georgia Institute of Technology. ,(2004)
T. Minohara, S. Ishikawa, M. Amano, Centralized surveillance of unused address space by using virtual networks pacific rim international symposium on dependable computing. pp. 325- 332 ,(2005) , 10.1109/PRDC.2005.23
Charlie Sabry, Robert John Johnson, Gordon Hanes, Network statistics processing device ,(2004)
David J. Plonka, Paul R. Barford, Vinod T. Yegneswaran, Scalable monitor of malicious network traffic ,(2005)
Paul Robert Barford, Somesh Jha, Jonathon Thomas Giffin, Vinod Trivandrum Yegneswaran, Semantically-aware network intrusion signature generator ,(2005)
Ronald O'Neal Edmark, John Michael Garrison, Vikki Kim Converse, Kenneth W. Blake, Method and system for morphing honeypot ,(2002)
John Roese, David Harrington, Richard Graham, Richard Bussiere, Mark Townsend, Steven Pettit, Distributed intrusion response system ,(2004)