Kadhim et al., 2006 - Google Patents
Design and Implementation of a Proposal Network FirewallKadhim et al., 2006
View PDF- Document ID
- 15520863563673514674
- Author
- Kadhim D
- Hussain W
- Publication year
- Publication venue
- Al-Khwarizmi Engineering Journal
External Links
Snippet
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from …
- 230000004224 protection 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bellovin | Distributed firewalls | |
US9832227B2 (en) | System and method for network level protection against malicious software | |
US6182226B1 (en) | System and method for controlling interactions between networks | |
EP1817685B1 (en) | Intrusion detection in a data center environment | |
US20060026680A1 (en) | System and method of characterizing and managing electronic traffic | |
Mahan et al. | Secure data transfer guidance for industrial control and SCADA systems | |
Chopra | Security issues of firewall | |
Kizza | Firewalls | |
Abie | An overview of firewall technologies | |
Cobb | Establishing firewall policy | |
Wool | Packet filtering and stateful firewalls | |
Weber | Firewall basics | |
Oloyede et al. | Firewall Approach To Computer Network Security: Functional Viewpoint | |
Kadhim et al. | Design and Implementation of a Proposal Network Firewall | |
Meredith | A summary of the autonomic distributed firewalls (ADF) project | |
Kaplesh et al. | Firewalls: A study on Techniques, Security and Threats | |
Keromytis et al. | Designing firewalls: A survey | |
Ozhiganova et al. | Functional model of firewall application layer protection for web-based information systems | |
Patel et al. | IJDI-ERET | |
Vasile | Firewall Technologies | |
Pandikumar et al. | Data Security in LAN Using Distributed Firewall | |
Etuk Effiong | CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN MODERN NETWORK SECURITY | |
Maiwada | Local Network Security Using Distributed Firewall | |
Balakrishnan et al. | and Harish Sukumaran {lokesh, ksrini, vinodkk, chow, sharish}@ utdallas. edu Department of Computer Science University of Texas at Dallas | |
Mustafa | Implement the packet filtering mechanism using the Dual-homed host architecture |