نتایج جستجو برای: Clustring and firewall

تعداد نتایج: 16827414  

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

Journal: :CLEI Electronic Journal 1998

2013
Loye L. Ray

Firewalls are core elements in network security, the effectiveness of firewall security is dependent on configuring the firewall policy correctly. A firewall policy describes the access that will be permitted or denied from the trusted network. In a corporate network several firewalls are setup and administrated by different individuals. The consistency between those firewall policies is crucia...

2004
Alex X. Liu Mohamed G. Gouda Huibo H. Ma Anne H. H. Ngu

Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is to examine each incoming and outgoing packet and decide whether to accept or to discard the packet based on a sequence of rules. Because a firewall may have a large number of rules and the rules often conflict, underst...

2013
Saber Salehi

Spam detection is a significant problem which is considered by many researchers by various developed strategies. The best and main spam detection technique should consider and scan the content of the messages to find spam. This research concerns the development of the certain category of granular computing as a classifier for spam detection. In this research, Fuzzy Granular Computing Classifica...

Journal: :Future Generation Comp. Syst. 2014
Xiangjian He Thawatchai Chomsiri Priyadarsi Nanda Zhiyuan Tan

This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., ListedRule firewalls) have their limitations in performing the tasks and are inapplicable for working on some networks with huge firewall rule sizes. The Listed-Rule firewall is mathemati...

2014
V. Hima Bindu G. Devi Abdul Vahed

Firewalls have been broadly organized on the Internet aimed at acquiring secluded systems. A firewall forms every received or departing packet towards to choose whether to receive or reject the packet grounded on its strategy. Improving firewall strategies is vital aimed at enlightening system performance. Earlier effort on firewall optimization emphases on both intra firewall or inter firewall...

Journal: :IJIPT 2010
Muhammad Arshad Ul Abedin Syeda Nessa Latifur Khan Ehab Al-Shaer Mamoun A. Awad

The firewall is usually the first line of defense in ensuring network security for an organization. However, the management of firewalls has proved to be complex, error-prone, and costly for many large-networks. Manually configured firewall rules can easily contain anomalies and mistakes. Even if the rules are anomaly-free, the presence of defects in the firewall implementation, or the firewall...

Journal: :Computers & Security 2003
Seny Kamara Sonia Fahmy E. Eugene Schultz Florian Kerschbaum Michael Frantzen

Firewalls protect a trusted network from an untrusted network by filtering traffic according to a specified security policy. A diverse set of firewalls is being used today. As it is infeasible to examine and test each firewall for all possible potential problems, a taxonomy is needed to understand firewall vulnerabilities in the context of firewall operations. This paper describes a novel metho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید