[go: up one dir, main page]

Asarcıklı, 2005 - Google Patents

Firewall monitoring using intrusion detection systems

Asarcıklı, 2005

View PDF
Document ID
12523727482671712190
Author
Asarcıklı Å
Publication year
Publication venue
PQDT-Global

External Links

Snippet

Most organizations have intranet, they know the benefits of connecting their private LAN to the Internet. However, Internet is inherently an insecure network. That makes the security of the computer systems an imported problem. The first step of network security is firewalls …
Continue reading at gcris.iyte.edu.tr (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
US7398389B2 (en) Kernel-based network security infrastructure
US8370936B2 (en) Multi-method gateway-based network security systems and methods
Kaur et al. Comparison of network security tools-firewall, intrusion detection system and Honeypot
KR et al. Intrusion detection tools and techniques–a survey
Kurundkar et al. Network intrusion detection using Snort
Mohammed et al. Automatic defense against zero-day polymorphic worms in communication networks
Sadiqui Computer network security
Dutta et al. Intrusion detection systems fundamentals
Rødfoss Comparison of open source network intrusion detection systems
Buchanan Introduction to security and network forensics
Asarcıklı Firewall monitoring using intrusion detection systems
Noureldien et al. On firewalls evaluation criteria
Harale et al. Network based intrusion detection and prevention systems: Attack classification, methodologies and tools
Singh et al. A review on intrusion detection system
Verwoerd Active network security
Pandya Local area network security
Pasha A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company
Biswas et al. Network Forensics Analysis
Bimbraw et al. Security Policy Based on Firewall and Intrusion Detection System
Peddisetty State-of-the-art Intrusion Detection: Technology, Challenges, and Evaluation.
Semerci Analysis of Intrusion Prevention Methods
Parker et al. Host Security
Ambika et al. Architecture for real time monitoring and modeling of network behavior for enhanced security
Zafar et al. Network security: a survey of modern approaches
Bansah et al. Implementation of Intrusion Detection System and Traffic Analysis–A Case of a Linux Platform