نتایج جستجو برای: clustring and firewall

تعداد نتایج: 16827414  

2015
V. Varalakshmi

Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis tools, such as Firewall Policy Advisor and FIREMAN, they can only detect the policy anomaly cannot resolve these anomalies, and detection time was also increased. Therefore, I re...

2003
Yuan-ni Guo Renfa Li

Conventional firewall has failed to resist the attack from the inside network and distributed firewall excessively relies on the host operation system, therefore embedded firewall become the focus of the current network security research. The paper discusses the design and implementation of firewall system based on embedded computing. In addition, it presents architecture of embedded firewall, ...

2008
Pooya Jaferian

Windows Vista is shipped with a built-in personal firewall. The firewall has lots of new features over its predecessor, XP’s firewall. But, previous studies showed that Vista’s firewall have a set of usability problems. The goal of this paper is to address the lack of a complete and validated prototype of improved Vista’s firewall interface. By providing a high-fidelity prototype that could be ...

Journal: :Computers & Security 2004
Avishai Wool

The common match fields in firewall rules refer to a packet’s source and destination IP addresses, protocol, and source and destination port numbers. However, most firewalls are also capable of filtering based on a packet’s direction: which network interface card the packet is crossing, and whether the packet is crossing the interface from the network into the firewall (‘‘inbound’’) or vice ver...

2006
Tugkan Tuglular

Tugkan Tuglular Dept. of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey [email protected] Firewall tests have to be performed to verify that the firewall works as specified. In this work, a test case generation approach is developed, which defines test cases based on the firewall rule sequence and uses real traffic database to prepare test packets. Test packets can ...

2001
Avishai Wool

Firewall admins and auditors face some tough questions: • Is the firewall really enforcing the corporate security policy? • How will the new admin learn the firewall rules? • We're acquiring company Y. What does their firewall allow?

Journal: :Computer Networks 2009
Alex X. Liu

Firewalls are important elements of enterprise security and have been the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall mainly depends on the quality of its policy (i.e., configuration). However, due to the lack of tools for verifying and troubleshooting firewall policies, most firewalls on the Internet have policy errors. A fir...

2011
Amir R. Khakpour Joshua W. Hulst Zihui Ge Alex X. Liu Dan Pei Jia Wang

Firewalls are critical security devices handling all traffic in and out of a network. When under heavy load of both malicious and legitimate traffic, firewalls may be overloaded and start discarding or permitting packets without checking firewall rules, which can cause huge revenue losses or security breaches. In this paper, we study Denial of Firewalling attacks, where attackers use well-craft...

2006
Yan-ning Huang Yong Jiang

Firewalls are the cornerstones of network security. To make firewalls working effectively, firewall manager must design firewall rules and the rule order correctly. In this paper, we present a firewall management toolkit which makes firewall rules understandable, designable and testable. Understandable means that the rules shown to the manager are easily understood. Designable means that it is ...

Journal: :International Journal of Computer Applications 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید