Natale, 2001 - Google Patents
TCP/IP and security software applicationsNatale, 2001
- Document ID
- 17567873077748088197
- Author
- Natale W
- Publication year
- Publication venue
- Journal of Computing Sciences in Colleges
External Links
Snippet
The TCP/IP protocol suite refers to a family of protocols. The designers of TCP/IP divided the job of a full protocol suite into a number of tasks delineated as layers (show in Figure 1 below). Each layer has a different, but specific task in communication. Conceptually, it is …
- 235000010384 tocopherol 0 title abstract 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/16—Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/19—Flow control or congestion control at layers above network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11522827B2 (en) | Detecting relayed communications | |
| US10033696B1 (en) | Identifying applications for intrusion detection systems | |
| CN1656731B (en) | Network security system and method based on multi-method gateway | |
| US7926108B2 (en) | SMTP network security processing in a transparent relay in a computer network | |
| US20050060535A1 (en) | Methods and apparatus for monitoring local network traffic on local network segments and resolving detected security and network management problems occurring on those segments | |
| US20020104017A1 (en) | Firewall system for protecting network elements connected to a public network | |
| Alt et al. | Uncovering network tarpits with degreaser | |
| Vigna | A topological characterization of TCP/IP security | |
| Natale | TCP/IP and security software applications | |
| Mogul | Using screend to implement IP/TCP security policies | |
| Triulzi | Intrusion Detection Systems and IPv6 | |
| He | Formal Specifications of Traceback Marking Protocols | |
| Avramopoulos et al. | Counteracting discrimination against network traffic | |
| Bisen et al. | Countermeasure tool-Carapace for Network Security | |
| Yang | A real time packet filtering module for network intrusion detection system | |
| Hutchinson | Study of Denial of Service | |
| Verwoerd | Stateful distributed firewalls. | |
| Peuhkuri | Denial of Service attacks | |
| Artore | Honeynet design and implementation | |
| Domnich | CYBER SECURITY AND COMPUTER ATTACKS | |
| Ferbrache | The nature of the hacking threat to open networks | |
| Mulge | Intrusion Detection | |
| Ashley et al. | Taxonomy of Various Attacks | |
| Barnett | Lead Contact: Daniel Lopez | |
| Kovacic | Computer Network Security for Large Scale Networks |