+

Hughes, 1996 - Google Patents

A high speed firewall architecture for ATM/OC-3C

Hughes, 1996

View PS
Document ID
6172641470744127920
Author
Hughes J
Publication year
Publication venue
unpublished), February

External Links

Snippet

The goal of ATM is high-performance wide area connectivity both site to site and end-point to end-point. Moving ATM from the labs and LANs to the MANs and WANs is not possible for many because of a lack of data stream policy, audit, commercial privacy, data integrity and …
Continue reading at coast.cs.purdue.edu (PS) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management

Similar Documents

Publication Publication Date Title
Reed et al. Proxies for anonymous routing
CA2258010C (en) Policy caching method and apparatus for use in a communication device
US7051365B1 (en) Method and apparatus for a distributed firewall
Goldberg et al. Freedom network 1.0 architecture and protocols
Hughes Actually useful Internet security techniques
US20040243837A1 (en) Process and communication equipment for encrypting e-mail traffic between mail domains of the internet
Chuang Securing ATM networks
Syverson et al. Private web browsing
Atkinson An Internetwork Authentication Architecture
Estrin et al. VISA scheme for inter-organization network security
Hughes A high speed firewall architecture for ATM/OC-3C
Xu et al. Design of a high-performance ATM firewall
Pierson et al. Context-agile encryption for high speed communication networks
Lyles et al. A reference model for firewall technology and its implications for connection signaling
Tarman et al. Implementing security for ATM networks
Stephens Security architecture for aeronautical networks
Varadharajan Securing local area and metropolitan area networks: A practical approach
Aura et al. Communications security on the Internet
Varadharajan NETWORKS: A PRACTICAL APPROACH
Tarman et al. Intrusion detection considerations for switched networks
Forrester Security in data networks
Varadharajan et al. Security issues in asynchronous transfer mode
Varadharajan et al. On the design of secure ATM networks
Varadharajan et al. Secure Authentication and Access Control in ATM Networks
Fahandezh A framework for IPSec functional architecture.
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载