Kumar, 2008 - Google Patents
DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALLKumar, 2008
View PDF- Document ID
- 4944576463395977589
- Author
- Kumar A
- Publication year
External Links
Snippet
Today, computer and networking are inseparable. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide …
- 238000001914 filtration 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ioannidis et al. | Implementing a distributed firewall | |
Blaze et al. | Trust management for IPsec | |
Bellovin | Distributed firewalls | |
US7661131B1 (en) | Authentication of tunneled connections | |
US7441265B2 (en) | Method and system for session based authorization and access control for networked application objects | |
US8800024B2 (en) | System and method for host-initiated firewall discovery in a network environment | |
US8490153B2 (en) | Automatically generating rules for connection security | |
US7316028B2 (en) | Method and system for transmitting information across a firewall | |
US7565526B1 (en) | Three component secure tunnel | |
US20020162026A1 (en) | Apparatus and method for providing secure network communication | |
US20030131245A1 (en) | Communication security system | |
Keromytis et al. | The STRONGMAN architecture | |
US20240195795A1 (en) | Computer-implemented methods and systems for establishing and/or controlling network connectivity | |
US20180103037A1 (en) | Resource access control using named capabilities | |
Yin et al. | Building an application-aware IPsec policy system | |
JP2005515700A (en) | Methods and devices for providing secure connections in mobile computing environments and other intermittent computing environments | |
Keromytis | Strongman: A scalable solution to trust management in networks | |
Kumar | DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL | |
Chitturi | Implementing mandatory network security in a policy-flexible system | |
EP1290852A2 (en) | Distributed firewall system and method | |
US20250097198A1 (en) | Zero-trust packet routing | |
Simpson et al. | Ports and Protocols Extended Control for Security. | |
US20250240175A1 (en) | Methods and systems for implementing secure communication channels between systems over a network | |
Wu et al. | IPSEC/PHIL (packet header information list): Design, implementation, and evaluation | |
Dowling et al. | A proxy-based security architecture for Internet applications in an extranet environment |