Oloyede et al., 2021 - Google Patents
Firewall approach to computer network security: Functional viewpointOloyede et al., 2021
- Document ID
- 1147796965579399362
- Author
- Oloyede O
- Yekini A
- Akinwole K
- Ojo O
- Publication year
- Publication venue
- International Journal of Advanced Networking and Applications
External Links
Snippet
In today's modern world, most businesses, regardless of size believes that access to the internet is essential to compete effectively in the industry. Yet, connecting a personal or corporate computers to the internet could expose personal or confidential data to malicious …
- 238000001914 filtration 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10542006B2 (en) | Network security based on redirection of questionable network access | |
| Chopra | Security issues of firewall | |
| Mihalos et al. | Design and Implementation of Firewall Security Policies using Linux Iptables. | |
| Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
| Kizza | Firewalls | |
| Dutta et al. | Intrusion detection systems fundamentals | |
| Nabi et al. | An overview of firewall types, technologies, and functionalities | |
| Oloyede et al. | Firewall approach to computer network security: Functional viewpoint | |
| Kantheti et al. | Performance and evaluation of firewalls and security | |
| Kandan et al. | Network attacks and prevention techniques-a study | |
| Ahmad et al. | Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution | |
| Banoth et al. | Modern cryptanalysis methods, advanced network attacks and cloud security | |
| Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
| Taib et al. | Security mechanisms for the IPv4 to IPv6 transition | |
| Ingham et al. | Network firewalls | |
| Sitorus et al. | Nunukan state court’s computer network security improvement using centralized next-generation firewall | |
| Sadik | ENHANCED NETWORK SECURITY SYSTEM USING FIRWALLS | |
| Khan et al. | Layered Defenses Securing the OSI Model Through Protocol Management and Advanced Cyber Strategies: A Strategic Approach to Safeguarding OSI Layers | |
| Qureshi | Analysis of Network Security Through VAPT and Network Monitoring | |
| Gurusamy | DIPLOMA THESIS ASSIGNMENT | |
| ACK | NEW QUESTION | |
| Biswas et al. | Network Forensics Analysis | |
| Patel et al. | IJDI-ERET | |
| Kadhim et al. | Design and Implementation of a Proposal Network Firewall | |
| Pandikumar et al. | Data Security in LAN Using Distributed Firewall |