Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
نویسندگان
چکیده
Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access control and the difficult analysis and configuration to conform with corporate security policy requirements. Without the use of specialized solutions that allow effective functioning of information security systems and their integration with other network applications, a well protected corporate network infrastructure is impossible. In this paper this thesis is considered from three perspectives: the choice of the distributed hardware platform to improve firewall performance; the description of security policy by means of an Organization Based Access Control mode, and automating the process of firewall rules formation based on high-level description of access policy requirements.
منابع مشابه
Performance Assessment and analysis of Specialized Nutrition and Food Security Working Group in Achiveing Strategic Goals of National Nutrition and Food Security Document in Iran
Performance Assessment and analysis of Specialized Nutrition and Food Security Working Group in Achiveing Strategic Goals of National Nutrition and Food Security Document in Iran Mona Pourghaderi1, Fatemeh Mohammadi-Nasrabadi2, Behzad Damari3*, Zahra Abdollahi4, Shiva Mafimoradi5,6, Sareh Edalati7, Nasrin Omidvar8** 1Ph.D. Candidate in Food and Nutrition Policy, Department of Community Nutriti...
متن کاملConformity with Clinical Setting among Nursing Students as a Way to Achieve Belongingness: A Qualitative Study
Introduction: Belongingness is one of the most important needs among students in order to have proper performance in clinical setting. If basic needs of students to security and belonging are not met, higher level needs will be of less importance and there will not be an opportunity to consider them. The purpose of this study is to present a set of findings by studies exploring nursing students...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملAllowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database
The society has grown to rely on internet services, and the number of internet client increases every day. As more users are connected to the network, millions a user to do their damage becomes very great and lucrative. In conventional firewall rely on topology restrictions and controlled network entry points to enforce packet filtering. In this paper, I propose method of multiple firewall conc...
متن کاملA Reference Model for Firewall Technology and its Implications for Connection Signaling
This paper concentrates all OlLe particular aspect of providing commllnication sccllrity: Iirewall:; between domains of lnlsl. We argue Utili signaling support for providing scalable security services is a design rcqulrcmcnl. On this basis we outline a reference model for firewall tcdlIlOlogy. It captures the current slate of t111~ art and proves suitable for connection-oriented high-performanc...
متن کامل