AU1268601A - Testing of access security of computers on a data communication network - Google Patents

Testing of access security of computers on a data communication network Download PDF

Info

Publication number
AU1268601A
AU1268601A AU12686/01A AU1268601A AU1268601A AU 1268601 A AU1268601 A AU 1268601A AU 12686/01 A AU12686/01 A AU 12686/01A AU 1268601 A AU1268601 A AU 1268601A AU 1268601 A AU1268601 A AU 1268601A
Authority
AU
Australia
Prior art keywords
computer
data
data communication
communication
port
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU12686/01A
Other languages
English (en)
Inventor
Peter Grundl
Aage Hejgaard Vestergaard
Ulf Munkedal
Lars Neupart
Bo Norgaard
Steen Varsted
Ken Willen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VIGILANTE AS
Original Assignee
VIGILANTE AS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by VIGILANTE AS filed Critical VIGILANTE AS
Publication of AU1268601A publication Critical patent/AU1268601A/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
AU12686/01A 1999-11-03 2000-11-03 Testing of access security of computers on a data communication network Abandoned AU1268601A (en)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
DKPA199901584 1999-11-03
DKPA199901584 1999-11-03
US16433299P 1999-11-09 1999-11-09
US60164332 1999-11-09
DKPA200001073 2000-07-07
DKPA200001073 2000-07-07
PCT/DK2000/000616 WO2001033353A2 (fr) 1999-11-03 2000-11-03 Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees

Publications (1)

Publication Number Publication Date
AU1268601A true AU1268601A (en) 2001-05-14

Family

ID=27221342

Family Applications (1)

Application Number Title Priority Date Filing Date
AU12686/01A Abandoned AU1268601A (en) 1999-11-03 2000-11-03 Testing of access security of computers on a data communication network

Country Status (5)

Country Link
EP (1) EP1232626A2 (fr)
JP (1) JP2003514275A (fr)
AU (1) AU1268601A (fr)
CA (1) CA2388306A1 (fr)
WO (1) WO2001033353A2 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7228566B2 (en) 2001-07-10 2007-06-05 Core Sdi, Incorporated Automated computer system security compromise
US7277937B2 (en) 2002-07-17 2007-10-02 Core Sdi, Incorporated Distributed computing using syscall proxying
US8874757B2 (en) 2007-12-19 2014-10-28 Telefonaktiebolaget Lm Ericsson (Publ) Method of facilitating IP connections to hosts behind middleboxes
TWI770855B (zh) * 2021-03-04 2022-07-11 凌華科技股份有限公司 裝置測試排序方法、裝置組態生成方法及其設備
US20220350641A1 (en) * 2021-04-28 2022-11-03 Microsoft Technology Licensing, Llc Securely cascading pipelines to various platforms based on targeting input

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4799153A (en) * 1984-12-14 1989-01-17 Telenet Communications Corporation Method and apparatus for enhancing security of communications in a packet-switched data communications system
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system

Also Published As

Publication number Publication date
WO2001033353A3 (fr) 2001-12-06
JP2003514275A (ja) 2003-04-15
EP1232626A2 (fr) 2002-08-21
WO2001033353A2 (fr) 2001-05-10
CA2388306A1 (fr) 2001-05-10

Similar Documents

Publication Publication Date Title
US7761918B2 (en) System and method for scanning a network
US7748040B2 (en) Attack correlation using marked information
US8789193B2 (en) Method and apparatus for detecting events pertaining to potential change in vulnerability status
Kuwatly et al. A dynamic honeypot design for intrusion detection
US7801980B1 (en) Systems and methods for determining characteristics of a network
US8555393B2 (en) Automated testing for security vulnerabilities of devices
US7317693B1 (en) Systems and methods for determining the network topology of a network
KR100681486B1 (ko) 부정통신 검출장치, 그 방법 및 기록매체
US20050125697A1 (en) Device for checking firewall policy
WO2005101789A1 (fr) Systeme d'evaluation en temps reel de la vulnerabilite d'un dispositif/hote a partir d'un reseau
Deraison et al. Passive vulnerability scanning: Introduction to NeVO
Terplan Intranet performance management
AU1268601A (en) Testing of access security of computers on a data communication network
Anderson Introduction to nessus
Aar et al. Analysis of penetration testing tools
He et al. Network penetration testing
Cardoso et al. Security vulnerabilities and exposures in internet systems and services
Gunnarsson et al. Muninn: monitoring changes in the Icelandic Internet through repeated port scanning
Turner Wireless Security and Monitoring for the Home Network
Deraison et al. Passive vulnerability scanning introduction
Deraison et al. Using Nessus to detect wireless access points
Simonsen Patch Management Security
Noordergraaf How Hackers Do It: More Tricks, Tools, and Techniques
Terlegård Design of a Secure Network Management System
Patel et al. A Dynamic Honeypot Design for Intrusion Detection