نتایج جستجو برای: clustring and firewall

تعداد نتایج: 16827414  

Journal: :CLEI Electron. J. 1998
Ernst L. Leiss Jianyu You

Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks, firewalls are utilized since they restrict network access while letting legitimate users have unencumbered access. Firewalls are also used to log security auditing information about connections and operations. We desc...

Journal: :journal of advances in computer research 0
hassan asgharian computer engineering, iran university of science and technology, tehran, iran ahmad akbari computer engineering, iran university of science and technology, tehran, iran bijan raahemi school of electrical engineering and computer science, university of ottawa, ottawa, canada

session initiation protocol (sip) is the main signaling protocol of next generation networks (ngn). sip based applications are usually deployed over the internet, for which their text-based nature and internal stateful operation make them vulnerable to different types of attacks. the real‑time functionality of sip based applications make their related security systems more complex. on the other...

Journal: :Medical image computing and computer-assisted intervention : MICCAI ... International Conference on Medical Image Computing and Computer-Assisted Intervention 2012
Katerina Fragkiadaki Weiyu Zhang Jianbo Shi Elena Bernardis

We cast segmentation of 3D tubular structures in a bundle as partitioning of structural-flow trajectories. Traditional 3D segmentation algorithms aggregate local pixel correlations incrementally along a 3D stack. In contrast, structural-flow trajectories establish long range pixel correspondences and their affinities propagate grouping cues across the entire volume simultaneously, from informat...

2007
Haiping Xu Mihir Ayachit Abhinay Reddyreddy

As more businesses deploy web services over the Internet, the issue of how to secure them from intruders and possible threats becomes more important. Firewalls have been designed as a major component to protect a network or a server from being attacked. However, since conventional firewalls emphasize on packet filtering at the transport and session layer, rather than verifying user permissions ...

Journal: :JCP 2013
Kasom Koht-Arsa Surasak Sanguanpong

Conventional high-availability stateful parallel firewall suffers from low scalability due to two overlapping requirements: workload distribution and redundancy. To achieve high throughput, load-distribution with complex algorithm is conventionally employed, consuming a lot of resources and making the system susceptible to state-related attacks such as SYN-flooding. On the other hand, making th...

2007
Almut Herzog Nahid Shahmehri

Effective security of a personal firewall depends on (1) the rule granularity and the implementation of the rule enforcement and (2) the correctness and granularity of user decisions at the time of an alert. A misconfigured or loosely configured firewall may be more dangerous than no firewall at all because of the user’s false sense of security. This study assesses effective security of 13 pers...

2006
Tina Wong

The firewalls in an enterprise network must be configured correctly or the internal corporate network can be infiltrated, leading to serious security, financial and performance implications. However, firewall configuration is a complex and error-prone task. Configuration languages are like assembly languages: they are low-level and vendor-specific. Moreover, usually multiple firewalls must be c...

2015
Fei Chen A. X. Liu C. R. Meiners Lawrence O. Hall Nitesh Chawla Kevin W. Bowyer

For last few years, Firewall usage with regard to protected network emails is important. Its ability to process inbound and confident bundle moves and accept or eliminate those bundle in accordance with the processing is what keeps this systems and networks protected. But considering a vast organization’s protection needs with regard to firewall program guidelines, typical home solutions won't ...

2001
Rongbo Du Rei Safavi-Naini Willy Susilo

A firewall is a system for enforcing access control policy between two networks and is one of the most important measures to protect against network attacks. Firewalls traditionally protect the internal network from outside threats. But there has been increasing need for preventing the misuses of the network by the internal users which most previous firewalls overlook. In this paper, we propose...

2002
James Harris

Firewalls are one of the most commonly used security systems to protect networks and hosts. Most researchers have focused on analyzing the latency and throughput of router firewalls. Different from this approach, this research focuses on studying the performance impact and the sensitivity of the Linux firewall (iptables) for a single host. In order to be able to measure the performance and the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید