Hughes, 1996 - Google Patents
A high speed firewall architecture for ATM/OC-3CHughes, 1996
View PS- Document ID
- 6172641470744127920
- Author
- Hughes J
- Publication year
- Publication venue
- unpublished), February
External Links
Snippet
The goal of ATM is high-performance wide area connectivity both site to site and end-point to end-point. Moving ATM from the labs and LANs to the MANs and WANs is not possible for many because of a lack of data stream policy, audit, commercial privacy, data integrity and …
- 210000004027 cells 0 description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Reed et al. | Proxies for anonymous routing | |
| CA2258010C (en) | Policy caching method and apparatus for use in a communication device | |
| US7051365B1 (en) | Method and apparatus for a distributed firewall | |
| Goldberg et al. | Freedom network 1.0 architecture and protocols | |
| Hughes | Actually useful Internet security techniques | |
| US20040243837A1 (en) | Process and communication equipment for encrypting e-mail traffic between mail domains of the internet | |
| Chuang | Securing ATM networks | |
| Syverson et al. | Private web browsing | |
| Atkinson | An Internetwork Authentication Architecture | |
| Estrin et al. | VISA scheme for inter-organization network security | |
| Hughes | A high speed firewall architecture for ATM/OC-3C | |
| Xu et al. | Design of a high-performance ATM firewall | |
| Pierson et al. | Context-agile encryption for high speed communication networks | |
| Lyles et al. | A reference model for firewall technology and its implications for connection signaling | |
| Tarman et al. | Implementing security for ATM networks | |
| Stephens | Security architecture for aeronautical networks | |
| Varadharajan | Securing local area and metropolitan area networks: A practical approach | |
| Aura et al. | Communications security on the Internet | |
| Varadharajan | NETWORKS: A PRACTICAL APPROACH | |
| Tarman et al. | Intrusion detection considerations for switched networks | |
| Forrester | Security in data networks | |
| Varadharajan et al. | Security issues in asynchronous transfer mode | |
| Varadharajan et al. | On the design of secure ATM networks | |
| Varadharajan et al. | Secure Authentication and Access Control in ATM Networks | |
| Fahandezh | A framework for IPSec functional architecture. |