Employing Proxy Services
ثبت نشده
چکیده
INTRODUCTION As the use of the TCP/IP protocol suite expanded during the 1990s in tandem with the growth in the use of the Internet, organizations began to realize a new security threat emerging as their networks were connected to the Internet. As academic, government, and commercial networks were connected to the Internet, they became subject to attack from literally an unlimited number of computer users located throughout the world. Although router access-lists provide a mechanism to enable or disable the flow of packets through router ports, based on source and destination IP address and the type of application data expressed in the form of a port number, organizations began to realize that by themselves router access-lists were not a sufficient barrier to prevent many types of undesirable operations against hosts residing behind a router. One solution developed to provide a higher level of security to organizational networks was the use of a firewall with proxy service capability located behind the router — which is the focus of this article. This article will first review the operation of router access-lists and some of their limitations. Using this information as a base, a description and discussion of the operation of different types of firewall proxy services and how they can be used to obtain an enhanced level of network protection will follow.
منابع مشابه
A Memory Accounting Interface for The Java Programming Language*
Widespread use of the Internet infrastructure for deploying services creates new issues and raises serious concerns regarding the security of their execution environment. Ideas of employing dynamic distributed systems for mounting e-services on the web are gaining strength. The main idea behind their proposed design is the use of distributed extensions. This permits execution of un-trusted serv...
متن کاملTo What Extent Is Long-term Care Representative of Elderly Care? A Case Study of Elderly Care Financing in Lombardy, Italy
The ageing of European population has been rapidly increasing during the last decades, and the problem of elderly care financing has become an issue for policy-makers. Long-term care (LTC) financing is considered a suitable proxy of the resources committed to elderly care by each government, but the preciseness of this approximation depends on the extent to which LTC is representative of elderl...
متن کاملEffects of spatial location and household wealth on health insurance subscription among women in Ghana
BACKGROUND This study compares ownership of health insurance among Ghanaian women with respect to wealth status and spatial location. We explore the overarching research question by employing geographic and proxy means targeting through interactive analysis of wealth status and spatial issues. METHODS The paper draws on the 2008 Ghana Demographic and Health Survey. Bivariate descriptive analy...
متن کاملJRPIT 41.2.QXP:Layout 1
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application domains. For example, a Network Access Control policy might be configured in terms of firewall, proxy, intrusion prevention and user-access policies. While defined separately, these security policies may interoperate...
متن کاملTransparent Autonomization in Aggregate Web Services Using Dynamic Proxies
We recently introduced RobustBPEL [13], a software toolkit that provides a systematic approach to making existing aggregate Web services more tolerant to the failure of their constituent Web services. Using RobustBPEL, we demonstrated how an aggregate Web service, defined as a BPEL process, can be instrumented automatically to monitor its partner Web services at runtime and replace failed servi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999