FIREWALL RULE CONFIGURATION TECHNIQUES MULTI-SERVICE SUPERCOMPUTER NETWORK
نویسندگان
چکیده
منابع مشابه
Firewall Configuration Errors Revisited
Practically every corporation that is connected to the Internet uses firewalls as the first line of its cyber-defense. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general tha...
متن کاملUsable Firewall Configuration
Configuration is perhaps the most important aspect of a firewall. It is often hard to fully understand the implications of a given configuration, giving rise to two problems: it is hard to write rules to enforce the expected security policy correctly, and it is hard to understand a set of rules to make necessary changes. In this paper, we briefly introduced the IP packet filtering firewall foll...
متن کاملVisual Firewall Rule Builder
The paper that is being submitted deals primarily with the implementation of firewall technology on Linux based systems. It focuses on the features of the visual medium for the creation and management of firewall rules, Visual Firewall Rule Builder – VFRB. VFRB has been written in Java and has a modular construction. The program consists of an object-oriented graphical user interface and a poli...
متن کاملImproving cloud network security using the Tree-Rule firewall
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., ListedRule firewalls) have their limitations in performing the tasks and are inapplicable for working on some networks with huge firewall rule sizes. The Listed-Rule firewall is mathemati...
متن کاملDeveloping Multidimensional Firewall Configuration Visualizations
Firewall configuration files are created and edited as text files, despite significant size, complexity, and the possibility of interaction between entries. We embedded interactive visualizations in a simple firewall ruleset editor. To make rulesets visualizable, we calculate the set of packets accepted by the firewall as a restricted case of constructive solid geometry. We show a lossless visu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EurasianUnionScientists
سال: 2020
ISSN: 2413-9335
DOI: 10.31618/esu.2413-9335.2020.1.75.828