AU1268601A - Testing of access security of computers on a data communication network - Google Patents
Testing of access security of computers on a data communication network Download PDFInfo
- Publication number
- AU1268601A AU1268601A AU12686/01A AU1268601A AU1268601A AU 1268601 A AU1268601 A AU 1268601A AU 12686/01 A AU12686/01 A AU 12686/01A AU 1268601 A AU1268601 A AU 1268601A AU 1268601 A AU1268601 A AU 1268601A
- Authority
- AU
- Australia
- Prior art keywords
- computer
- data
- data communication
- communication
- port
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DKPA199901584 | 1999-11-03 | ||
DKPA199901584 | 1999-11-03 | ||
US16433299P | 1999-11-09 | 1999-11-09 | |
US60164332 | 1999-11-09 | ||
DKPA200001073 | 2000-07-07 | ||
DKPA200001073 | 2000-07-07 | ||
PCT/DK2000/000616 WO2001033353A2 (fr) | 1999-11-03 | 2000-11-03 | Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees |
Publications (1)
Publication Number | Publication Date |
---|---|
AU1268601A true AU1268601A (en) | 2001-05-14 |
Family
ID=27221342
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU12686/01A Abandoned AU1268601A (en) | 1999-11-03 | 2000-11-03 | Testing of access security of computers on a data communication network |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1232626A2 (fr) |
JP (1) | JP2003514275A (fr) |
AU (1) | AU1268601A (fr) |
CA (1) | CA2388306A1 (fr) |
WO (1) | WO2001033353A2 (fr) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7228566B2 (en) | 2001-07-10 | 2007-06-05 | Core Sdi, Incorporated | Automated computer system security compromise |
US7277937B2 (en) | 2002-07-17 | 2007-10-02 | Core Sdi, Incorporated | Distributed computing using syscall proxying |
US8874757B2 (en) | 2007-12-19 | 2014-10-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of facilitating IP connections to hosts behind middleboxes |
TWI770855B (zh) * | 2021-03-04 | 2022-07-11 | 凌華科技股份有限公司 | 裝置測試排序方法、裝置組態生成方法及其設備 |
US20220350641A1 (en) * | 2021-04-28 | 2022-11-03 | Microsoft Technology Licensing, Llc | Securely cascading pipelines to various platforms based on targeting input |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4799153A (en) * | 1984-12-14 | 1989-01-17 | Telenet Communications Corporation | Method and apparatus for enhancing security of communications in a packet-switched data communications system |
US5892903A (en) * | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
-
2000
- 2000-11-03 CA CA002388306A patent/CA2388306A1/fr not_active Abandoned
- 2000-11-03 AU AU12686/01A patent/AU1268601A/en not_active Abandoned
- 2000-11-03 JP JP2001535781A patent/JP2003514275A/ja active Pending
- 2000-11-03 WO PCT/DK2000/000616 patent/WO2001033353A2/fr not_active Application Discontinuation
- 2000-11-03 EP EP00974341A patent/EP1232626A2/fr not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
WO2001033353A3 (fr) | 2001-12-06 |
JP2003514275A (ja) | 2003-04-15 |
EP1232626A2 (fr) | 2002-08-21 |
WO2001033353A2 (fr) | 2001-05-10 |
CA2388306A1 (fr) | 2001-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7761918B2 (en) | System and method for scanning a network | |
US7748040B2 (en) | Attack correlation using marked information | |
US8789193B2 (en) | Method and apparatus for detecting events pertaining to potential change in vulnerability status | |
Kuwatly et al. | A dynamic honeypot design for intrusion detection | |
US7801980B1 (en) | Systems and methods for determining characteristics of a network | |
US8555393B2 (en) | Automated testing for security vulnerabilities of devices | |
US7317693B1 (en) | Systems and methods for determining the network topology of a network | |
KR100681486B1 (ko) | 부정통신 검출장치, 그 방법 및 기록매체 | |
US20050125697A1 (en) | Device for checking firewall policy | |
WO2005101789A1 (fr) | Systeme d'evaluation en temps reel de la vulnerabilite d'un dispositif/hote a partir d'un reseau | |
Deraison et al. | Passive vulnerability scanning: Introduction to NeVO | |
Terplan | Intranet performance management | |
AU1268601A (en) | Testing of access security of computers on a data communication network | |
Anderson | Introduction to nessus | |
Aar et al. | Analysis of penetration testing tools | |
He et al. | Network penetration testing | |
Cardoso et al. | Security vulnerabilities and exposures in internet systems and services | |
Gunnarsson et al. | Muninn: monitoring changes in the Icelandic Internet through repeated port scanning | |
Turner | Wireless Security and Monitoring for the Home Network | |
Deraison et al. | Passive vulnerability scanning introduction | |
Deraison et al. | Using Nessus to detect wireless access points | |
Simonsen | Patch Management Security | |
Noordergraaf | How Hackers Do It: More Tricks, Tools, and Techniques | |
Terlegård | Design of a Secure Network Management System | |
Patel et al. | A Dynamic Honeypot Design for Intrusion Detection |