[go: up one dir, main page]

Kadhim et al., 2006 - Google Patents

Design and Implementation of a Proposal Network Firewall

Kadhim et al., 2006

View PDF
Document ID
15520863563673514674
Author
Kadhim D
Hussain W
Publication year
Publication venue
Al-Khwarizmi Engineering Journal

External Links

Snippet

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from …
Continue reading at www.alkej.uobaghdad.edu.iq (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Bellovin Distributed firewalls
US9832227B2 (en) System and method for network level protection against malicious software
US6182226B1 (en) System and method for controlling interactions between networks
EP1817685B1 (en) Intrusion detection in a data center environment
US20060026680A1 (en) System and method of characterizing and managing electronic traffic
Mahan et al. Secure data transfer guidance for industrial control and SCADA systems
Chopra Security issues of firewall
Kizza Firewalls
Abie An overview of firewall technologies
Cobb Establishing firewall policy
Wool Packet filtering and stateful firewalls
Weber Firewall basics
Oloyede et al. Firewall Approach To Computer Network Security: Functional Viewpoint
Kadhim et al. Design and Implementation of a Proposal Network Firewall
Meredith A summary of the autonomic distributed firewalls (ADF) project
Kaplesh et al. Firewalls: A study on Techniques, Security and Threats
Keromytis et al. Designing firewalls: A survey
Ozhiganova et al. Functional model of firewall application layer protection for web-based information systems
Patel et al. IJDI-ERET
Vasile Firewall Technologies
Pandikumar et al. Data Security in LAN Using Distributed Firewall
Etuk Effiong CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN MODERN NETWORK SECURITY
Maiwada Local Network Security Using Distributed Firewall
Balakrishnan et al. and Harish Sukumaran {lokesh, ksrini, vinodkk, chow, sharish}@ utdallas. edu Department of Computer Science University of Texas at Dallas
Mustafa Implement the packet filtering mechanism using the Dual-homed host architecture