[go: up one dir, main page]

Oloyede et al., 2021 - Google Patents

Firewall approach to computer network security: Functional viewpoint

Oloyede et al., 2021

Document ID
1147796965579399362
Author
Oloyede O
Yekini A
Akinwole K
Ojo O
Publication year
Publication venue
International Journal of Advanced Networking and Applications

External Links

Snippet

In today's modern world, most businesses, regardless of size believes that access to the internet is essential to compete effectively in the industry. Yet, connecting a personal or corporate computers to the internet could expose personal or confidential data to malicious …
Continue reading at search.proquest.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
US10542006B2 (en) Network security based on redirection of questionable network access
Chopra Security issues of firewall
Mihalos et al. Design and Implementation of Firewall Security Policies using Linux Iptables.
Mohammed et al. Automatic defense against zero-day polymorphic worms in communication networks
Kizza Firewalls
Dutta et al. Intrusion detection systems fundamentals
Nabi et al. An overview of firewall types, technologies, and functionalities
Oloyede et al. Firewall approach to computer network security: Functional viewpoint
Kantheti et al. Performance and evaluation of firewalls and security
Kandan et al. Network attacks and prevention techniques-a study
Ahmad et al. Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution
Banoth et al. Modern cryptanalysis methods, advanced network attacks and cloud security
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
Taib et al. Security mechanisms for the IPv4 to IPv6 transition
Ingham et al. Network firewalls
Sitorus et al. Nunukan state court’s computer network security improvement using centralized next-generation firewall
Sadik ENHANCED NETWORK SECURITY SYSTEM USING FIRWALLS
Khan et al. Layered Defenses Securing the OSI Model Through Protocol Management and Advanced Cyber Strategies: A Strategic Approach to Safeguarding OSI Layers
Qureshi Analysis of Network Security Through VAPT and Network Monitoring
Gurusamy DIPLOMA THESIS ASSIGNMENT
ACK NEW QUESTION
Biswas et al. Network Forensics Analysis
Patel et al. IJDI-ERET
Kadhim et al. Design and Implementation of a Proposal Network Firewall
Pandikumar et al. Data Security in LAN Using Distributed Firewall