{"title":"网络边界安全的防火墙技术研究","authors":"Lingfang Huang","doi":"10.1109/APSCC.2012.23","DOIUrl":null,"url":null,"abstract":"The edge networks that are contained within individual organizations and households can be found at various locations across the Internet. Within the current Internet which is much larger and deeper, edge networks with no protection or with limited protection are invaded time and time again by malicious user. A method to protecting an edge network against intruders is referred to as perimeter security. The firewall technology is a successful adaptation of this method in the era of computer networks. This paper presents firewall technologies and basic structures.","PeriodicalId":437766,"journal":{"name":"IEEE Asia-Pacific Services Computing Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"The Firewall Technology Study of Network Perimeter Security\",\"authors\":\"Lingfang Huang\",\"doi\":\"10.1109/APSCC.2012.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The edge networks that are contained within individual organizations and households can be found at various locations across the Internet. Within the current Internet which is much larger and deeper, edge networks with no protection or with limited protection are invaded time and time again by malicious user. A method to protecting an edge network against intruders is referred to as perimeter security. The firewall technology is a successful adaptation of this method in the era of computer networks. This paper presents firewall technologies and basic structures.\",\"PeriodicalId\":437766,\"journal\":{\"name\":\"IEEE Asia-Pacific Services Computing Conference\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Asia-Pacific Services Computing Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APSCC.2012.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Asia-Pacific Services Computing Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSCC.2012.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Firewall Technology Study of Network Perimeter Security
The edge networks that are contained within individual organizations and households can be found at various locations across the Internet. Within the current Internet which is much larger and deeper, edge networks with no protection or with limited protection are invaded time and time again by malicious user. A method to protecting an edge network against intruders is referred to as perimeter security. The firewall technology is a successful adaptation of this method in the era of computer networks. This paper presents firewall technologies and basic structures.