Kaplesh et al., 2019 - Google Patents
Firewalls: A study on Techniques, Security and ThreatsKaplesh et al., 2019
View PDF- Document ID
- 13627577553417331656
- Author
- Kaplesh P
- Goel A
- Publication year
- Publication venue
- Pramana Res. J.
External Links
Snippet
Abstract Information and excitement for computer system security is developing day by day along with its requirement. The interest is no uncertainty, due to the advancements with the extension of web services and due to the extension in the quantity of organizations that …
- 238000000034 method 0 title abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7735116B1 (en) | System and method for unified threat management with a relational rules methodology | |
| US9832227B2 (en) | System and method for network level protection against malicious software | |
| Jingyao et al. | Securing a network: how effective using firewalls and VPNs are? | |
| Chopra | Security issues of firewall | |
| Kumar et al. | Implementation of firewall & intrusion detection system using pfSense to enhance network security | |
| KR20210001728A (en) | Ship security system for Ethernet network based ship network protection. | |
| Kizza | Firewalls | |
| Schneider | The state of network security | |
| Kaplesh et al. | Firewalls: A study on Techniques, Security and Threats | |
| Singh et al. | Comparative analysis of traditional firewalls and next-generation firewalls: A review | |
| Emmanuel et al. | Windows firewall bypassing techniques: An overview of HTTP tunneling and Nmap evasion | |
| Oloyede et al. | Firewall Approach To Computer Network Security: Functional Viewpoint | |
| Keromytis et al. | Designing firewalls: A survey | |
| Mohseni | Network Security for Small Businesses | |
| Suhag | Paradigmatic Approaches for Network Security and Preventing Intrusions: A Secure Computer Shield | |
| Simpson et al. | Network Defense in an End-to-End Paradigm | |
| Pathak | The Review of Terms and Concepts used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals. | |
| MAREȘ | Solutions to Secure a Network | |
| Dusseault | Methods for the Prevention of Data Exfiltration by Dns Tunneling | |
| Pandikumar et al. | Data Security in LAN Using Distributed Firewall | |
| Sulaman | An Analysis and Comparison of The Security Features of Firewalls and IDSs | |
| Pravail | 2100 Series Appliances Version 5.4 | |
| Axner | Network Security: Firewalls Guard Intranets from Invasion | |
| Rao et al. | Firewalls | |
| Sharma et al. | NETWORK SECURITY USING FIREWALLS |