Secure firewall configurations

作者: Teal Richard S

DOI:

关键词:

摘要: The configuration of a firewall on an endpoint is secured to prevent changes by unauthorized processes, while permitting that are requested authorized processes. Authorized processes can be stored in tamper protection cache within kernel the operating system and with reference trust authority external system. When process requests change configuration, requesting checked against listed cache, any suitable rules applied limit or configuration.

参考文章(135)
Jerry Mahler, Michael Borella, Ikhlaq Sidhu, Guido Schuster, System for user-space network packet modification ,(1998)
John J. Danahy, Ryan J. Berg, Lawrence J. Rose, Secure remote kernel communication ,(2001)
Ajay Bhave, Andrey Lelikov, Ning Zhang, Caglar Gunyakti, Wen-Pin Hsu, Caching information for kernel and boot components ,(2005)
Neil Horman, Eric Paris, Centralized kernel module loading ,(2011)
Nezer Zaidenberg, Michael Kiperberg, Amit Resh, System and methods for cpu copy protection of a computing device ,(2013)
Weiming Tang, James Matthew Brewer, Systems and methods for secure communication ,(2014)
Jiwei Zhao, Zhigang Chen, Shiguang Li, Wu Jiang, Anti-virus method and apparatus and firewall device ,(2012)