Maddumala, 2017 - Google Patents
Distributed perimeter firewall policy management frameworkMaddumala, 2017
View PDF- Document ID
- 9342819838359738175
- Author
- Maddumala M
- Publication year
External Links
Snippet
A perimeter firewall is the first line of defense that stops unwanted packets (based on defined firewall policies) entering the organization that deploys it. In the real world, every organization maintains a perimeter firewall between internet (which could be untrusted) and …
- 230000002123 temporal effect 0 description 71
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12192173B2 (en) | Network traffic inspection | |
US10958662B1 (en) | Access proxy platform | |
US11457040B1 (en) | Reverse TCP/IP stack | |
US10462188B2 (en) | Computer network security system | |
Scott-Hayward et al. | A survey of security in software defined networks | |
US9723019B1 (en) | Infected endpoint containment using aggregated security status information | |
Guttman et al. | Rigorous automated network security management | |
Bringhenti et al. | Improving the formal verification of reachability policies in virtualized networks | |
US20060206615A1 (en) | Systems and methods for dynamic and risk-aware network security | |
Rios et al. | From SMOG to Fog: a security perspective | |
Tudosi et al. | Secure network architecture based on distributed firewalls | |
US11683345B2 (en) | Application identity-based enforcement of datagram protocols | |
Achleitner et al. | MLSNet: A policy complying multilevel security framework for software defined networking | |
Belmonte Martin et al. | Threat landscape and good practice guide for software defined networks/5g | |
Ayodele et al. | SDN as a defence mechanism: a comprehensive survey | |
JP2017201774A (en) | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM | |
US20250240313A1 (en) | Large language model (llm) powered detection reasoning solution | |
Jadhav et al. | Detection and mitigation of arp spoofing attack | |
Kim et al. | Fingerprinting edge and cloud services in iot | |
Maddumala | Distributed perimeter firewall policy management framework | |
Huang et al. | Construction of switch information security protection system based on software‐defined networking | |
Kfouri et al. | Design of a Distributed HIDS for IoT Backbone Components. | |
Wachs | A secure and resilient communication infrastructure for decentralized networking applications | |
Abd-Allah et al. | A Comprehensive Survey on Security Challenges and Solutions in Software-Defined Network | |
Zoure et al. | VeriNeS: Runtime verification of outsourced network services orchestration |