[go: up one dir, main page]

Sulaman, 2011 - Google Patents

An Analysis and Comparison of The Security Features of Firewalls and IDSs

Sulaman, 2011

View PDF
Document ID
1297272618344751589
Author
Sulaman S
Publication year

External Links

Snippet

In last few years we have observed a significant increase in the usage of computing devices and their capabilities to communicate with each other. With the increase in usage and communicating capabilities the higher level of network security is also required. Today the …
Continue reading at www.diva-portal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
EP2555486B1 (en) Multi-method gateway-based network security systems and methods
US20060026680A1 (en) System and method of characterizing and managing electronic traffic
Kaur et al. Comparison of network security tools-firewall, intrusion detection system and Honeypot
Bansode et al. Common vulnerabilities exposed in VPN–A survey
CN111295640B (en) Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Kizza Firewalls
Schneider The state of network security
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Stanciu Technologies, methodologies and challenges in network intrusion detection and prevention systems.
Sulieman et al. Detecting zero-day polymorphic worm: A review
Rajkumar et al. Evolution for a secured path using NexGen firewalls
Hooper An intelligent detection and response strategy to false positives and network attacks
Sulaman An Analysis and Comparison of The Security Features of Firewalls and IDSs
Verwoerd et al. Security architecture testing using IDS—a case study
Selvaraj et al. Enhancing intrusion detection system performance using firecol protection services based honeypot system
Patel et al. IJDI-ERET
Biswas et al. Network Forensics Analysis
Hooper Intelligent autonomic strategy to attacks in network infrastructure protection: Feedback methods to IDS, using policies, alert filters and firewall packet filters for multiple protocols
Hongach Jr Mitigating security flaws in the tcp/ip protocol suite
Khan et al. A survey on network attacks and defence-in-depth mechanism by intrusion detection system
Akkaladevi et al. Defending against Botnets.
Ojo Internet Traffic Monitoring: Case Study: The Network of Granlund Oy
Nakato Networks Security: Attacks and Defense Mechanism by Designing an Intelligent Firewall Agent
Venuti et al. Deliverable DJ2. 4.1: Specification of Advanced Methods for Incident and Security Threats' Detection and Mitigation in a Multi-Domain Environment