نتایج جستجو برای: firewall
تعداد نتایج: 4739 فیلتر نتایج به سال:
Firewall is the main defence of our network and is no guarantee the present of hidden vulnerabilities. Under there is no well-defined general methodology for testing the firewalls, this is always a big headache for the administrators. Two firewall testing approaches are being compared and the correctness of the testing result is reported as well.
The configuration of security functions in computer networks is still typically performed manually, which likely leads to breaches and long re-configuration times. This problem exacerbated for modern based on network virtualization, because their complexity dynamics make a correct manual practically unfeasible. article focuses packet filters, i.e., the most common firewall technology used netwo...
This paper mainly studies computer network security and firewall technology, discussing the functions, main technologies, configurations, measures, design ideas of technology. With popularization networks, issues are receiving increasing attention from people. We can propose corresponding measures to address shortcomings vulnerabilities in current settings, order expect our be more secure. In t...
Writing and managing firewall ACLs are hard and error-prone tasks for a wide range of reasons. During these tasks, inconsistent rules can be introduced. An inconsistent firewall ACL implies in general a design error, and indicates that the firewall is accepting traffic that should be denied or vice versa. However, the administrator is who ultimately decides if an inconsistent rule is a fault or...
Communication security and regulatory compliance have made the firewall a vital element for networked computers. They provide the protections between parties that only wish to communicate over an explicit set of channels, expressed through protocols, traveling over a network. These explicit set of channels are described and implemented in a firewall using a set of rules. The firewall implements...
This paper introduces a new method to improve the performance of list oriented firewall systems. Specifically, the paper addresses reordering a firewall rule set to minimize the average number of comparisons to determine the action, while maintaining the integrity of the original policy. Integrity is preserved if the reordered and original rules always arrive at the same result given a packet. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید