[go: up one dir, main page]

Liang, 2011 - Google Patents

A Survey of Firewall Technologies for Network Security

Liang, 2011

Document ID
17495206217865610987
Author
Liang X
Publication year
Publication venue
Energy Procedia

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
US20220337557A1 (en) System and method for monitoring and securing communications networks and associated devices
Salah et al. Using cloud computing to implement a security overlay network
Kumar Denial of service attacks–an updated perspective
Chang et al. Deciduous: Decentralized source identification for network-based intrusions
Alabady Design and Implementation of a Network Security Model for Cooperative Network.
Krit et al. Overview of firewalls: Types and policies: Managing windows embedded firewall programmatically
Giri et al. Distributed denial of service (DDoS) mitigation in software defined network using blockchain
Jadhav et al. Detection and mitigation of arp spoofing attack
Mitropoulos et al. Network forensics: towards a classification of traceback mechanisms
Deri et al. Using cyberscore for network traffic monitoring
Tudosi et al. Network congestion solution for FTP services based on distributed firewall and snort
Liang A Survey of Firewall Technologies for Network Security
Wong Classifying and Identifying BGP Hijacking attacks on the internet
Sadik ENHANCED NETWORK SECURITY SYSTEM USING FIRWALLS
Bahaa Preventing brute force attack through the analyzing log
Salaria et al. Firewall and Its Policies Management
US12425369B1 (en) Reflex-reaction server leakage containment system
Soepeno Comprehensive Network Analysis Through a Single Main Network Architecture
Hausman et al. CompTIA Security+ SY0-301 Exam Cram
Daru et al. Packet Filtering Gateway and Application Layer Gateway on Mikrotik Router Based Firewalls for Server and Internet Access Restrictions
Tiamiyu ALGORITHMIZATION, REQUIREMENTS ANALYSIS AND ARCHITECTURAL CHALLENGES OF TRACONDA
Foote¹ et al. for Vulnerability Prevention
Sharma Network Traffic Analysis
Jasiul et al. Federated Cyber Defence System—Applied methods and techniques
da Silva Rosa Detecção de Ataques de Redirecionamento BGP do Lado dos Clientes