FIREWALL RULE CONFIGURATION TECHNIQUES MULTI-SERVICE SUPERCOMPUTER NETWORK

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Firewall Configuration Errors Revisited

Practically every corporation that is connected to the Internet uses firewalls as the first line of its cyber-defense. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general tha...

متن کامل

Usable Firewall Configuration

Configuration is perhaps the most important aspect of a firewall. It is often hard to fully understand the implications of a given configuration, giving rise to two problems: it is hard to write rules to enforce the expected security policy correctly, and it is hard to understand a set of rules to make necessary changes. In this paper, we briefly introduced the IP packet filtering firewall foll...

متن کامل

Visual Firewall Rule Builder

The paper that is being submitted deals primarily with the implementation of firewall technology on Linux based systems. It focuses on the features of the visual medium for the creation and management of firewall rules, Visual Firewall Rule Builder – VFRB. VFRB has been written in Java and has a modular construction. The program consists of an object-oriented graphical user interface and a poli...

متن کامل

Improving cloud network security using the Tree-Rule firewall

This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., ListedRule firewalls) have their limitations in performing the tasks and are inapplicable for working on some networks with huge firewall rule sizes. The Listed-Rule firewall is mathemati...

متن کامل

Developing Multidimensional Firewall Configuration Visualizations

Firewall configuration files are created and edited as text files, despite significant size, complexity, and the possibility of interaction between entries. We embedded interactive visualizations in a simple firewall ruleset editor. To make rulesets visualizable, we calculate the set of packets accepted by the firewall as a restricted case of constructive solid geometry. We show a lossless visu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EurasianUnionScientists

سال: 2020

ISSN: 2413-9335

DOI: 10.31618/esu.2413-9335.2020.1.75.828