Sulaman, 2011 - Google Patents
An Analysis and Comparison of The Security Features of Firewalls and IDSsSulaman, 2011
View PDF- Document ID
- 1297272618344751589
- Author
- Sulaman S
- Publication year
External Links
Snippet
In last few years we have observed a significant increase in the usage of computing devices and their capabilities to communicate with each other. With the increase in usage and communicating capabilities the higher level of network security is also required. Today the …
- 238000004458 analytical method 0 title description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2555486B1 (en) | Multi-method gateway-based network security systems and methods | |
| US20060026680A1 (en) | System and method of characterizing and managing electronic traffic | |
| Kaur et al. | Comparison of network security tools-firewall, intrusion detection system and Honeypot | |
| Bansode et al. | Common vulnerabilities exposed in VPN–A survey | |
| CN111295640B (en) | Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation | |
| Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
| Kizza | Firewalls | |
| Schneider | The state of network security | |
| Simkhada et al. | Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review | |
| Stanciu | Technologies, methodologies and challenges in network intrusion detection and prevention systems. | |
| Sulieman et al. | Detecting zero-day polymorphic worm: A review | |
| Rajkumar et al. | Evolution for a secured path using NexGen firewalls | |
| Hooper | An intelligent detection and response strategy to false positives and network attacks | |
| Sulaman | An Analysis and Comparison of The Security Features of Firewalls and IDSs | |
| Verwoerd et al. | Security architecture testing using IDS—a case study | |
| Selvaraj et al. | Enhancing intrusion detection system performance using firecol protection services based honeypot system | |
| Patel et al. | IJDI-ERET | |
| Biswas et al. | Network Forensics Analysis | |
| Hooper | Intelligent autonomic strategy to attacks in network infrastructure protection: Feedback methods to IDS, using policies, alert filters and firewall packet filters for multiple protocols | |
| Hongach Jr | Mitigating security flaws in the tcp/ip protocol suite | |
| Khan et al. | A survey on network attacks and defence-in-depth mechanism by intrusion detection system | |
| Akkaladevi et al. | Defending against Botnets. | |
| Ojo | Internet Traffic Monitoring: Case Study: The Network of Granlund Oy | |
| Nakato | Networks Security: Attacks and Defense Mechanism by Designing an Intelligent Firewall Agent | |
| Venuti et al. | Deliverable DJ2. 4.1: Specification of Advanced Methods for Incident and Security Threats' Detection and Mitigation in a Multi-Domain Environment |