2012 IEEE Asia-Pacific Services Computing Conference 2012
DOI: 10.1109/apscc.2012.23
|View full text |Cite
|
Sign up to set email alerts
|

The Firewall Technology Study of Network Perimeter Security

Abstract: The edge networks that are contained within individual organizations and households can be found at various locations across the Internet. Within the current Internet which is much larger and deeper, edge networks with no protection or with limited protection are invaded time and time again by malicious user. A method to protecting an edge network against intruders is referred to as perimeter security. The firewall technology is a successful adaptation of this method in the era of computer networks. This paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Firewalls protect assets by isolating private network networks from public networks by filtering traffic and blocking access to untrusted sources or IP addresses [89]. But the disadvantages of firewalls are also obvious, once an attacker breaches the network's defensive perimeter, the firewall cannot stop him from acting illegally on the internal network.…”
Section: Perimetrized Architecturementioning
confidence: 99%
“…Firewalls protect assets by isolating private network networks from public networks by filtering traffic and blocking access to untrusted sources or IP addresses [89]. But the disadvantages of firewalls are also obvious, once an attacker breaches the network's defensive perimeter, the firewall cannot stop him from acting illegally on the internal network.…”
Section: Perimetrized Architecturementioning
confidence: 99%
“…It acts like a subnetwork defender, but only in a workstation, meaning that this type of firewall can manage single or multiple hosts, but only within the same network. Being often used as proprietary-based software integrated into cloud platforms, personal firewalls generally have limited network customization facilities [54].…”
Section: Personal Firewallmentioning
confidence: 99%
“…Firewalls are deployed to guard the smart grid communication networks against cyber intrusions. They enable electronic security perimeters that allow only the legitimate data traffic to access the gateways for smart grid communications …”
Section: Security Controls For the Smart Gridmentioning
confidence: 99%