Liang, 2011 - Google Patents
A Survey of Firewall Technologies for Network SecurityLiang, 2011
- Document ID
- 17495206217865610987
- Author
- Liang X
- Publication year
- Publication venue
- Energy Procedia
External Links
- 238000001914 filtration 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220337557A1 (en) | System and method for monitoring and securing communications networks and associated devices | |
Salah et al. | Using cloud computing to implement a security overlay network | |
Kumar | Denial of service attacks–an updated perspective | |
Chang et al. | Deciduous: Decentralized source identification for network-based intrusions | |
Alabady | Design and Implementation of a Network Security Model for Cooperative Network. | |
Krit et al. | Overview of firewalls: Types and policies: Managing windows embedded firewall programmatically | |
Giri et al. | Distributed denial of service (DDoS) mitigation in software defined network using blockchain | |
Jadhav et al. | Detection and mitigation of arp spoofing attack | |
Mitropoulos et al. | Network forensics: towards a classification of traceback mechanisms | |
Deri et al. | Using cyberscore for network traffic monitoring | |
Tudosi et al. | Network congestion solution for FTP services based on distributed firewall and snort | |
Liang | A Survey of Firewall Technologies for Network Security | |
Wong | Classifying and Identifying BGP Hijacking attacks on the internet | |
Sadik | ENHANCED NETWORK SECURITY SYSTEM USING FIRWALLS | |
Bahaa | Preventing brute force attack through the analyzing log | |
Salaria et al. | Firewall and Its Policies Management | |
US12425369B1 (en) | Reflex-reaction server leakage containment system | |
Soepeno | Comprehensive Network Analysis Through a Single Main Network Architecture | |
Hausman et al. | CompTIA Security+ SY0-301 Exam Cram | |
Daru et al. | Packet Filtering Gateway and Application Layer Gateway on Mikrotik Router Based Firewalls for Server and Internet Access Restrictions | |
Tiamiyu | ALGORITHMIZATION, REQUIREMENTS ANALYSIS AND ARCHITECTURAL CHALLENGES OF TRACONDA | |
Foote¹ et al. | for Vulnerability Prevention | |
Sharma | Network Traffic Analysis | |
Jasiul et al. | Federated Cyber Defence System—Applied methods and techniques | |
da Silva Rosa | Detecção de Ataques de Redirecionamento BGP do Lado dos Clientes |