Broderick, 2005 - Google Patents
Firewalls–Are they enough protection for current networks?Broderick, 2005
View PDF- Document ID
- 3718191489040892344
- Author
- Broderick J
- Publication year
- Publication venue
- Information Security Technical Report
External Links
Snippet
Firewalls are widely deployed in most organizations connected to the Internet to implement their information security policy and to protect information from unauthorized access. Yet intruders still manage to attack systems and gain unauthorized access to information that is …
- 230000002633 protecting 0 abstract description 18
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Beale et al. | Wireshark & Ethereal network protocol analyzer toolkit | |
US8640237B2 (en) | Integrated firewall, IPS, and virus scanner system and method | |
Frahim et al. | Cisco ASA: all-in-one firewall, IPS, and VPN adaptive security appliance | |
Noonan et al. | Firewall fundamentals | |
Lodin et al. | Firewalls fend off invasions from the net | |
Deal | Cisco router firewall security | |
Frahim et al. | Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services | |
Santos et al. | Cisco next-generation security solutions: All-in-one cisco ASA firepower services, NGIPS, and AMP | |
Dees et al. | Enhancing infrastructure security in real estate | |
de Hoz Diego et al. | CMXsafe: A proxy layer for securing internet-of-things communications | |
Broderick | Firewalls–Are they enough protection for current networks? | |
Vachon | CCNA security portable command guide | |
Brooks | CLOUD TO EDGEWARE: Wireless Grid Applications, Architecture and Security for the Internet of Things | |
Cameron et al. | Configuring Juniper Networks NetScreen and SSG Firewalls | |
Frahim et al. | Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance | |
Flynn | Designing and building enterprise DMZs | |
Cameron et al. | Juniper (r) Networks Secure Access SSL VPN Configuration Guide | |
Rao et al. | Understanding networks and network security | |
Maurya et al. | Changing Trend in Network Security Measures: A Review | |
Devarasetty | Zscaler Cloud Security Essentials | |
Yeo | Personal firewalls for administrators and remote users | |
Gibson | CISSP Rapid Review | |
Moraes | Cisco Firewalls: Concepts, Design and Deployment for Cisco Stateful Firewall Solutions | |
Bendell | Configuring SonicWALL Firewalls | |
Mlodzianowski et al. | CCNP and CCIE Security Core SCOR 350-701 Exam Cram |