نتایج جستجو برای: clustring and firewall
تعداد نتایج: 16827414 فیلتر نتایج به سال:
Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis tools, such as Firewall Policy Advisor and FIREMAN, they can only detect the policy anomaly cannot resolve these anomalies, and detection time was also increased. Therefore, I re...
Conventional firewall has failed to resist the attack from the inside network and distributed firewall excessively relies on the host operation system, therefore embedded firewall become the focus of the current network security research. The paper discusses the design and implementation of firewall system based on embedded computing. In addition, it presents architecture of embedded firewall, ...
Windows Vista is shipped with a built-in personal firewall. The firewall has lots of new features over its predecessor, XP’s firewall. But, previous studies showed that Vista’s firewall have a set of usability problems. The goal of this paper is to address the lack of a complete and validated prototype of improved Vista’s firewall interface. By providing a high-fidelity prototype that could be ...
The common match fields in firewall rules refer to a packet’s source and destination IP addresses, protocol, and source and destination port numbers. However, most firewalls are also capable of filtering based on a packet’s direction: which network interface card the packet is crossing, and whether the packet is crossing the interface from the network into the firewall (‘‘inbound’’) or vice ver...
Tugkan Tuglular Dept. of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey [email protected] Firewall tests have to be performed to verify that the firewall works as specified. In this work, a test case generation approach is developed, which defines test cases based on the firewall rule sequence and uses real traffic database to prepare test packets. Test packets can ...
Firewall admins and auditors face some tough questions: • Is the firewall really enforcing the corporate security policy? • How will the new admin learn the firewall rules? • We're acquiring company Y. What does their firewall allow?
Firewalls are important elements of enterprise security and have been the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall mainly depends on the quality of its policy (i.e., configuration). However, due to the lack of tools for verifying and troubleshooting firewall policies, most firewalls on the Internet have policy errors. A fir...
Firewalls are critical security devices handling all traffic in and out of a network. When under heavy load of both malicious and legitimate traffic, firewalls may be overloaded and start discarding or permitting packets without checking firewall rules, which can cause huge revenue losses or security breaches. In this paper, we study Denial of Firewalling attacks, where attackers use well-craft...
Firewalls are the cornerstones of network security. To make firewalls working effectively, firewall manager must design firewall rules and the rule order correctly. In this paper, we present a firewall management toolkit which makes firewall rules understandable, designable and testable. Understandable means that the rules shown to the manager are easily understood. Designable means that it is ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید