Asarcıklı, 2005 - Google Patents
Firewall monitoring using intrusion detection systemsAsarcıklı, 2005
View PDF- Document ID
- 12523727482671712190
- Author
- Asarcıklı Å
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
Most organizations have intranet, they know the benefits of connecting their private LAN to the Internet. However, Internet is inherently an insecure network. That makes the security of the computer systems an imported problem. The first step of network security is firewalls …
- 238000001514 detection method 0 title abstract description 168
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7398389B2 (en) | Kernel-based network security infrastructure | |
| US8370936B2 (en) | Multi-method gateway-based network security systems and methods | |
| Kaur et al. | Comparison of network security tools-firewall, intrusion detection system and Honeypot | |
| KR et al. | Intrusion detection tools and techniques–a survey | |
| Kurundkar et al. | Network intrusion detection using Snort | |
| Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
| Sadiqui | Computer network security | |
| Dutta et al. | Intrusion detection systems fundamentals | |
| Rødfoss | Comparison of open source network intrusion detection systems | |
| Buchanan | Introduction to security and network forensics | |
| Asarcıklı | Firewall monitoring using intrusion detection systems | |
| Noureldien et al. | On firewalls evaluation criteria | |
| Harale et al. | Network based intrusion detection and prevention systems: Attack classification, methodologies and tools | |
| Singh et al. | A review on intrusion detection system | |
| Verwoerd | Active network security | |
| Pandya | Local area network security | |
| Pasha | A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company | |
| Biswas et al. | Network Forensics Analysis | |
| Bimbraw et al. | Security Policy Based on Firewall and Intrusion Detection System | |
| Peddisetty | State-of-the-art Intrusion Detection: Technology, Challenges, and Evaluation. | |
| Semerci | Analysis of Intrusion Prevention Methods | |
| Parker et al. | Host Security | |
| Ambika et al. | Architecture for real time monitoring and modeling of network behavior for enhanced security | |
| Zafar et al. | Network security: a survey of modern approaches | |
| Bansah et al. | Implementation of Intrusion Detection System and Traffic Analysis–A Case of a Linux Platform |