Esc
Network Traffic Filtering
Definition
Restricting network traffic originating from any location.
loading...
Technique Subclasses
There are 4 techniques in this category, Network Traffic Filtering.
Name | ID | Definition | Synonyms |
---|---|---|---|
Network Traffic Filtering | D3-NTF | Restricting network traffic originating from any location. | |
- Inbound Traffic Filtering | D3-ITF | Restricting network traffic originating from untrusted networks destined towards a private host or enclave. | |
- Outbound Traffic Filtering | D3-OTF | Restricting network traffic originating from a private host or enclave destined towards untrusted networks. | |
- Email Filtering | D3-EF | Filtering incoming email traffic based on specific criteria. |
loading...
References
All
Patent
Internet Article
The following references were used to develop the Network Traffic Filtering knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Active firewall system and methodology
Reference Type: Patent Organization: McAfee LLC Author: Emilio Villa, Adrian Zidaritz, Michael David Varga, Gerhard Eschelbeck, Michael Kevin Jones, Mark James McArdle
Automatically generating rules for connection security
Reference Type: Patent Organization: Microsoft Author: Charles D. Bassett; Eran Yariv; Ian M. Carbaugh; Lokesh Srinivas Koppolu; Maksim Noy; Sarah A. Wahlert; Pradeep Bahl
FWTK - Firewall Toolkit
Reference Type: Internet Article
Firewall for interent access
Reference Type: Patent Organization: Secure Computing LLC Author: Edward B Stockwell, Alan E Klietz
Firewall for processing a connectionless network packet
Reference Type: Patent Organization: National Security Agency Author: Patrick W. Dowd, John T. McHenry
Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented network
Reference Type: Patent Organization: National Security Agency Author: Patrick W. Dowd, John T. McHenry
Firewalls that filter based upon protocol commands
Reference Type: Patent Organization: Intel Corp Author: James E. Toga
Method for controlling computer network security
Reference Type: Patent Organization: Checkpoint Software Technologies Ltd Author: Gil Shwed
Network firewall with proxy
Reference Type: Patent Organization: Secure Computing LLC Author: Michael W Green, Ricky Ronald Kruse
D3FEND™
A knowledge graph of cybersecurity countermeasures