Network security processing

作者: Ian Robertson

DOI:

关键词:

摘要: A method, and associated system, for security processing of a request resource in network system. The the is received from client device. duplicate created. its are forwarded to first proxy server second server, respectively. output including request, determination made whether differ; if not or transmitted web satisfying request; so alarm generated transmission blocked.

参考文章(26)
Zhixu Liu, Zujun Xu, Tiejun Wu, Yanlong Zhang, Mingfeng Huang, Huaigu Ou, Device, method and system to prevent tampering with network content ,(2010)
Fred A. Cummins, Computer model of security risks ,(2002)
Daisuke Matsubara, Satoshi Nagano, Hiroshi Kurihara, Kazuho Miki, Narihiro Oomoto, Content control system ,(2009)
Michelle Marie Zatlyn, Lee Hahn Holloway, Matthew Browning Prince, Internet-based proxy security services ,(2010)
Carey S. Nachenberg, Elias E. Guy, Stream scanning through network proxy servers ,(2003)
Achraf Gazdar, Zeineb Langar, Abdelfettah Belghith, A distributed cooperative detection scheme for SPIT attacks in SIP based systems international conference on network of future. pp. 1- 5 ,(2012) , 10.1109/NOF.2012.6464004