[go: up one dir, main page]

Kaplesh et al., 2019 - Google Patents

Firewalls: A study on Techniques, Security and Threats

Kaplesh et al., 2019

View PDF
Document ID
13627577553417331656
Author
Kaplesh P
Goel A
Publication year
Publication venue
Pramana Res. J.

External Links

Snippet

Abstract Information and excitement for computer system security is developing day by day along with its requirement. The interest is no uncertainty, due to the advancements with the extension of web services and due to the extension in the quantity of organizations that …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
US7735116B1 (en) System and method for unified threat management with a relational rules methodology
US9832227B2 (en) System and method for network level protection against malicious software
Jingyao et al. Securing a network: how effective using firewalls and VPNs are?
Chopra Security issues of firewall
Kumar et al. Implementation of firewall & intrusion detection system using pfSense to enhance network security
KR20210001728A (en) Ship security system for Ethernet network based ship network protection.
Kizza Firewalls
Schneider The state of network security
Kaplesh et al. Firewalls: A study on Techniques, Security and Threats
Singh et al. Comparative analysis of traditional firewalls and next-generation firewalls: A review
Emmanuel et al. Windows firewall bypassing techniques: An overview of HTTP tunneling and Nmap evasion
Oloyede et al. Firewall Approach To Computer Network Security: Functional Viewpoint
Keromytis et al. Designing firewalls: A survey
Mohseni Network Security for Small Businesses
Suhag Paradigmatic Approaches for Network Security and Preventing Intrusions: A Secure Computer Shield
Simpson et al. Network Defense in an End-to-End Paradigm
Pathak The Review of Terms and Concepts used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals.
MAREȘ Solutions to Secure a Network
Dusseault Methods for the Prevention of Data Exfiltration by Dns Tunneling
Pandikumar et al. Data Security in LAN Using Distributed Firewall
Sulaman An Analysis and Comparison of The Security Features of Firewalls and IDSs
Pravail 2100 Series Appliances Version 5.4
Axner Network Security: Firewalls Guard Intranets from Invasion
Rao et al. Firewalls
Sharma et al. NETWORK SECURITY USING FIREWALLS