Akademska digitalna zbirka SLovenije - logo
E-viri
Recenzirano Odprti dostop
  • Firewall Monitoring
    Leiss, Ernst L.; You, Jianyu

    CLEI electronic journal, 06/1998, Letnik: 1, Številka: 1
    Journal Article

    Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks, firewalls are utilized since they restrict network access while letting legitimate users have unencumbered access. Firewalls are also used to log security auditing information about connections and operations. We describe a monitor database gateway (MDBG) designed and implemented to replace older forms of firewall logging by a database system. SQL commands can be used to retrieve logged information instead of ad hoc scripts. The database application al- lows secure access from other components of a firewall through the Ker- beros authentication as well as other authentication methods. If the underlying database changes, only a small portion of the MDBG must be modified; the code for the other components of the firewall remains un- affected.