{"title":"The Firewall Technology Study of Network Perimeter Security","authors":"Lingfang Huang","doi":"10.1109/APSCC.2012.23","DOIUrl":null,"url":null,"abstract":"The edge networks that are contained within individual organizations and households can be found at various locations across the Internet. Within the current Internet which is much larger and deeper, edge networks with no protection or with limited protection are invaded time and time again by malicious user. A method to protecting an edge network against intruders is referred to as perimeter security. The firewall technology is a successful adaptation of this method in the era of computer networks. This paper presents firewall technologies and basic structures.","PeriodicalId":437766,"journal":{"name":"IEEE Asia-Pacific Services Computing Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Asia-Pacific Services Computing Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSCC.2012.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
The edge networks that are contained within individual organizations and households can be found at various locations across the Internet. Within the current Internet which is much larger and deeper, edge networks with no protection or with limited protection are invaded time and time again by malicious user. A method to protecting an edge network against intruders is referred to as perimeter security. The firewall technology is a successful adaptation of this method in the era of computer networks. This paper presents firewall technologies and basic structures.