Do I Need to Be Concerned About These Firewall Log Entries?

نویسنده

  • Arvid Soderberg
چکیده

I'm working in a large health care institution that operates a hospital, a day surgery center, nursing homes, urgent care and occupational medicine facilities, and medical office buildings on four campuses, two community health clinics, as well as eight home health agencies in surrounding counties. We have installed a firewall to segregate the main campus network, a Frame Relay network connecting remote locations, wireless network implementations, a remote access concentrator used for ISDN and analog remote connections...

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hot Topics: Information Retrieval for Network Security

Topic modeling is performed on 12 million firewall log entries to depict changes in the network over time.

متن کامل

SOM with Vulture Fest Model Discovers Feral Malware and Visually Profiles the Security of Subnets

We propose a model for using firewall log entries of denied inbound Internet traffic for indirect discovery of local IP addresses that have security problems. This method is used successfully to discover computers with security problems on a network. A hexagonal SelfOrganizing Map then illustrates the network landscape of wireless traffic comparing it with malicious traffic and contrasting it t...

متن کامل

رژیم غذایی در بیمارانی که پیوند کلیه شده اند

Diet of patient who has tolerated kidney transplantation is differing from the past. Knowing about this subject, help patient choose proper diet. Patient may be has many questions about his/her diet that must be considered. Do you need to special diet? Yes, after kidney transplantation, diet playing important role. You understanding that attention to diet after transplantation are easier than d...

متن کامل

Editorial Challenges

  Editorial Challenges abound as to the journals in Persian, which here I will refer to some of them. However, many of these challenges are concerned with all journals. The main problem which most articles suffer is neglecting the three elements of articles' necessity, purpose and benefit by their writers. Sometimes, one, two or all three of these elements are neglected, or little attention ...

متن کامل

A Mutli-Agent System for Firewall Forensics Analysis

Computer Forensics applies law to fight against unlawful and illegitimate use of computers and networks. It employs investigation methods to solve computer crimes. Knowing that the firewall is the unique input and output in a network, it is considered as the ideal location for recording network activities. The firewall log files trace all incoming and outgoing events in a network. Its content c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015