Asarcıklı, 2005 - Google Patents
Firewall monitoring using intrusion detection systemsAsarcıklı, 2005
View PDF- Document ID
- 12523727482671712190
- Author
- Asarcıklı Å
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
Most organizations have intranet, they know the benefits of connecting their private LAN to the Internet. However, Internet is inherently an insecure network. That makes the security of the computer systems an imported problem. The first step of network security is firewalls …
- 238000001514 detection method 0 title abstract description 168
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7398389B2 (en) | Kernel-based network security infrastructure | |
| US8370936B2 (en) | Multi-method gateway-based network security systems and methods | |
| Kaur et al. | Comparison of network security tools-firewall, intrusion detection system and Honeypot | |
| KR et al. | Intrusion detection tools and techniques–a survey | |
| Marinova-Boncheva | A short survey of intrusion detection systems | |
| Kurundkar et al. | Network intrusion detection using Snort | |
| Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
| Sadiqui | Computer network security | |
| Dutta et al. | Intrusion detection systems fundamentals | |
| Rødfoss | Comparison of open source network intrusion detection systems | |
| Zafar et al. | Network security: a survey of modern approaches | |
| Asarcıklı | Firewall monitoring using intrusion detection systems | |
| Buchanan | Introduction to security and network forensics | |
| Noureldien et al. | On firewalls evaluation criteria | |
| Harale et al. | Network based intrusion detection and prevention systems: Attack classification, methodologies and tools | |
| Singh et al. | A review on intrusion detection system | |
| Dunigan et al. | Intrusion detection and intrusion prevention on a large network: A case study | |
| Pasha | A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company | |
| Biswas et al. | Network Forensics Analysis | |
| Banoth et al. | Network Security Infrastructure, Attackers and Their Tools, Common Threats and Attacks, Network Monitoring and Tools | |
| Pandya | Local area network security | |
| Bimbraw et al. | Security Policy Based on Firewall and Intrusion Detection System | |
| Peddisetty | State-of-the-art Intrusion Detection: Technology, Challenges, and Evaluation. | |
| Semerci | Analysis of Intrusion Prevention Methods | |
| Ambika et al. | Architecture for real time monitoring and modeling of network behavior for enhanced security |