Movatterモバイル変換


[0]ホーム

URL:


Kadhim et al., 2006 - Google Patents

Design and Implementation of a Proposal Network Firewall

Kadhim et al., 2006

ViewPDF
Document ID
15520863563673514674
Author
Kadhim D
Hussain W
Publication year
Publication venue
Al-Khwarizmi Engineering Journal

External Links

Snippet

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from …
Continue reading atwww.alkej.uobaghdad.edu.iq (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

PublicationPublication DateTitle
BellovinDistributed firewalls
US9832227B2 (en)System and method for network level protection against malicious software
US6182226B1 (en)System and method for controlling interactions between networks
EP1817685B1 (en)Intrusion detection in a data center environment
US20060026680A1 (en)System and method of characterizing and managing electronic traffic
Mahan et al.Secure data transfer guidance for industrial control and SCADA systems
ChopraSecurity issues of firewall
AbieAn overview of firewall technologies
KizzaFirewalls
CobbEstablishing firewall policy
Oloyede et al.Firewall Approach To Computer Network Security: Functional Viewpoint
WoolPacket filtering and stateful firewalls
WeberFirewall basics
Kadhim et al.Design and Implementation of a Proposal Network Firewall
Kaplesh et al.Firewalls: A study on Techniques, Security and Threats
MeredithA summary of the autonomic distributed firewalls (ADF) project
Keromytis et al.Designing firewalls: A survey
Ozhiganova et al.Functional model of firewall application layer protection for web-based information systems
Patel et al.IJDI-ERET
VasileFirewall Technologies
Pandikumar et al.Data Security in LAN Using Distributed Firewall
Etuk EffiongCHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN MODERN NETWORK SECURITY
MaiwadaLocal Network Security Using Distributed Firewall
Balakrishnan et al.and Harish Sukumaran {lokesh, ksrini, vinodkk, chow, sharish}@ utdallas. edu Department of Computer Science University of Texas at Dallas
MustafaImplement the packet filtering mechanism using the Dual-homed host architecture

[8]
ページ先頭

©2009-2025 Movatter.jp