Firewall Monitoring
نویسندگان
چکیده
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks, firewalls are utilized since they restrict network access while letting legitimate users have unencumbered access. Firewalls are also used to log security auditing information about connections and operations. We describe a monitor database gateway (MDBG) designed and implemented to replace older forms of firewall logging by a database system. SQL commands can be used to retrieve logged information instead of ad hoc scripts. The database application allows secure access from other components of a firewall through the Kerberos authentication as well as other authentication methods. If the underlying database changes, only a small portion of the MDBG must be modified; the code for the other components of the firewall remains un-
منابع مشابه
Interactive and Dynamic Visual Port Monitoring and Analysis
Techniques in conjunction with an implemented environment are described for the visual monitoring and analysis of port activity. The goal is to provide the ability to detect anomalous or mischievous activity on an individual system basis. Such capabilities would allow individual users of systems to garner greater insight into the network activity of their system than is currently provided by ty...
متن کاملA Holistic Approach to Securing Web Applications
Protection of Web applications is an activity that requires constant monitoring of security threats as well as looking for solutions in this field. Since protection has moved from the lower layers of OSI models to the application layer and having in mind the fact that 75% of all the attacks are performed at the application layer, special attention should be paid to the application layer. It is ...
متن کاملOn the Design and Use of Internet Sinks for Network Abuse Monitoring
Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with typical network intrusion detection and firewall systems. In this paper, we address the problem of designing and deploying a system for monitoring large unused address spaces such as class A telescopes with 16M IP addresses. We ...
متن کاملReal-Time Interactive Visual Port Monitoring and Analysis
Techniques in conjunction with an implemented environment are described for the visual monitoring and analysis of port activity. The goal is to provide the ability to detect anomalous or mischievous activity on an individual system basis. Such capabilities would allow individual users of systems to garner greater insight into the network activity of their system than is currently provided by ty...
متن کاملDifference Between Antivirus And Intrusion Detection System
With the various and increasingly malicious attacks on networks and wireless systems, traditional security tools such as anti-virus programs. The service Intrusion Detection System Renon Web Technologies is beyond the Sostaziale the difference between a firewall and an IDS it is that the latter. trained and certified in firewall and IPS/IDS technologies but not the core body of security knowled...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CLEI Electron. J.
دوره 1 شماره
صفحات -
تاریخ انتشار 1998