REDUNDANCY REMOVAL OF RULES WITH REORDERING THEM TO INCREASE THE FIREWALL OPTIMIZATION

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimization of Firewall Filtering Rules by a Thorough Rewriting

The management of firewalls in today’s enterprise network environment is a complex and error-prone task. Effective techniques and tools for administrating the firewall configurations should be available to network administrators. In this paper, we present such a technique by using the geometry technology to model the firewall configurations. Each filtering rule is mapped onto a hyperspace objec...

متن کامل

the present study is a survey os postmodern historical novel with respect to the voice of women. it argues how the recorded history is regulated by the rules of power and how women have been excluded from this discourse.ther study analysez angela carters nights at the circus as an example of postmodern historical novel to illustrate how this novel has questioned the historical narrative and how it has inserted women into history by breaking the rules of patriarchy.

the present thesis is a study of postmodern historical novel with respect to the voice of women. according to postmodern historiography,the established institution of history is one of the other manifestations of patriarchys power which has silenced women. the study analyzes angela carters nights at the circus as a postmodern historical novel which makes its female characters transgress the pat...

15 صفحه اول

Creating firewall rules with machine learning techniques

The war against cybercrime is a constant battle. While cyber criminals keep using the same basic attack techniques [M.v.j.], the amount and diversity of malware grows [M. Fossi]. This renders security defenses ineffective such that millions of computers are infected with malware in the form of computer viruses, internet worms and Trojan horses. These cybercrimes cost the society money [G. Lovet...

متن کامل

Firewall Rules Analysis

In this paper, we propose a method to analyze the firewall policy or rule-set using Relational Algebra and Raining 2D-Box Model. It can discover all the anomalies in the firewall rule-set in the format that is usually used by many firewall products such as Cisco Access Control List, IPTABLES, IPCHAINS and Check Point Firewall-1. While the existing analyzing methods consider the anomalies betwee...

متن کامل

Using Redundancy to Increase Survivability

Secure communication services—that is, communication services that provide attributes such as confidentiality, integrity, and authenticity—typically implement each attribute using a single method for each connection. For example, confidentiality may be provided by DES and integrity by keyed MD5. Although such an approach may be secure in the traditional sense, it is not survivable—once a method...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2014

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2014.0310051