نتایج جستجو برای: clustring and firewall

تعداد نتایج: 16827414  

Journal: :Electronics and Electrical Engineering 2012

Journal: :International Journal of Engineering & Technology 2018

Journal: :IEEE Transactions on Dependable and Secure Computing 2023

The configuration of security functions in computer networks is still typically performed manually, which likely leads to breaches and long re-configuration times. This problem exacerbated for modern based on network virtualization, because their complexity dynamics make a correct manual practically unfeasible. article focuses packet filters, i.e., the most common firewall technology used netwo...

Journal: :Archive of Formal Proofs 2017
Achim D. Brucker Lukas Brügger Burkhart Wolff

We present a formal model of network protocols and their application to modeling firewall policies. The formalization is based on the Unified Policy Framework (UPF). The formalization was originally developed with for generating test cases for testing the security configuration actual firewall and router (middle-boxes) using HOL-TestGen. Our work focuses on modeling application level protocols ...

Journal: :JCIT 2008
Yi Yin Kazuaki Hida Yoshiaki Katayama Naohisa Takahashi

Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. If anomalies, such as no packets reach to a server in a local network, which is protected by an individual firewall or by the most downstream firewall of hierarchical structure firewalls, exist in local network, an admi...

Journal: :Future Internet 2021

Nowadays there are many DNS firewall solutions to prevent users accessing malicious domains. These can provide real-time protection and block illegitimate communications, contributing the cybersecurity posture of organizations. Most these based on known domain lists that being constantly updated. However, in this way, it is only possible communications for domains, leaving out others but have n...

2010
Alberto Leporati Claudio Ferretti C. Ferretti

We propose to use tissue-like P systems as a tool to model and analyse the security properties of firewall systems. The idea comes from a clear analogy between firewall rules and P systems rules: they both modify and or move objects (data packets, or symbols of an alphabet) among the regions of the system. The use of P systems for modeling packet filters, routers and firewalls gives the possibi...

2017

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

2006
Masashi Ito Akira Watanabe

In recent years, IP telephone has achieved remarkable progress on the Internet through "low price ", "continuous connection", and "high speed communication band". However, it is not easy to use IP telephone over firewall and NAT because of its restrictions of the communication. We have proposed the system called SoFW (SIP over Firewall) that suppresses the problem. In this paper, detailed funct...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید