[go: up one dir, main page]

Maddumala, 2017 - Google Patents

Distributed perimeter firewall policy management framework

Maddumala, 2017

View PDF
Document ID
9342819838359738175
Author
Maddumala M
Publication year

External Links

Snippet

A perimeter firewall is the first line of defense that stops unwanted packets (based on defined firewall policies) entering the organization that deploys it. In the real world, every organization maintains a perimeter firewall between internet (which could be untrusted) and …
Continue reading at mospace.umsystem.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
US12192173B2 (en) Network traffic inspection
US10958662B1 (en) Access proxy platform
US11457040B1 (en) Reverse TCP/IP stack
US10462188B2 (en) Computer network security system
Scott-Hayward et al. A survey of security in software defined networks
US9723019B1 (en) Infected endpoint containment using aggregated security status information
Guttman et al. Rigorous automated network security management
Bringhenti et al. Improving the formal verification of reachability policies in virtualized networks
US20060206615A1 (en) Systems and methods for dynamic and risk-aware network security
Rios et al. From SMOG to Fog: a security perspective
Tudosi et al. Secure network architecture based on distributed firewalls
US11683345B2 (en) Application identity-based enforcement of datagram protocols
Achleitner et al. MLSNet: A policy complying multilevel security framework for software defined networking
Belmonte Martin et al. Threat landscape and good practice guide for software defined networks/5g
Ayodele et al. SDN as a defence mechanism: a comprehensive survey
JP2017201774A (en) COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
US20250240313A1 (en) Large language model (llm) powered detection reasoning solution
Jadhav et al. Detection and mitigation of arp spoofing attack
Kim et al. Fingerprinting edge and cloud services in iot
Maddumala Distributed perimeter firewall policy management framework
Huang et al. Construction of switch information security protection system based on software‐defined networking
Kfouri et al. Design of a Distributed HIDS for IoT Backbone Components.
Wachs A secure and resilient communication infrastructure for decentralized networking applications
Abd-Allah et al. A Comprehensive Survey on Security Challenges and Solutions in Software-Defined Network
Zoure et al. VeriNeS: Runtime verification of outsourced network services orchestration