[go: up one dir, main page]

Kumar, 2008 - Google Patents

DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL

Kumar, 2008

View PDF
Document ID
4944576463395977589
Author
Kumar A
Publication year

External Links

Snippet

Today, computer and networking are inseparable. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering

Similar Documents

Publication Publication Date Title
Ioannidis et al. Implementing a distributed firewall
Blaze et al. Trust management for IPsec
Bellovin Distributed firewalls
US7661131B1 (en) Authentication of tunneled connections
US7441265B2 (en) Method and system for session based authorization and access control for networked application objects
US8800024B2 (en) System and method for host-initiated firewall discovery in a network environment
US8490153B2 (en) Automatically generating rules for connection security
US7316028B2 (en) Method and system for transmitting information across a firewall
US7565526B1 (en) Three component secure tunnel
US20020162026A1 (en) Apparatus and method for providing secure network communication
US20030131245A1 (en) Communication security system
Keromytis et al. The STRONGMAN architecture
US20240195795A1 (en) Computer-implemented methods and systems for establishing and/or controlling network connectivity
US20180103037A1 (en) Resource access control using named capabilities
Yin et al. Building an application-aware IPsec policy system
JP2005515700A (en) Methods and devices for providing secure connections in mobile computing environments and other intermittent computing environments
Keromytis Strongman: A scalable solution to trust management in networks
Kumar DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL
Chitturi Implementing mandatory network security in a policy-flexible system
EP1290852A2 (en) Distributed firewall system and method
US20250097198A1 (en) Zero-trust packet routing
Simpson et al. Ports and Protocols Extended Control for Security.
US20250240175A1 (en) Methods and systems for implementing secure communication channels between systems over a network
Wu et al. IPSEC/PHIL (packet header information list): Design, implementation, and evaluation
Dowling et al. A proxy-based security architecture for Internet applications in an extranet environment