Sciweavers

Share
CLEIEJ
1998

Firewall Monitoring

11 years 11 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks, firewalls are utilized since they restrict network access while letting legitimate users have unencumbered access. Firewalls are also used to log security auditing information about connections and operations. We describe a monitor database gateway (MDBG) designed and implemented to replace older forms of firewall logging by a database system. SQL commands can be used to retrieve logged information instead of ad hoc scripts. The database application allows secure access from other components of a firewall through the Kerberos authentication as well as other authentication methods. If the underlying database changes, only a small portion of the MDBG must be modified; the code for the other components of the firewall remains unaffected.
Ernst L. Leiss, Jianyu You
Added 21 Dec 2010
Updated 21 Dec 2010
Type Journal
Year 1998
Where CLEIEJ
Authors Ernst L. Leiss, Jianyu You
Comments (0)
books