نتایج جستجو برای: firewall

تعداد نتایج: 4739  

2007
Alok Tongaonkar Niranjan Inamdar R. Sekar

Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of firewall management. Typically, firewalls use a large number of low-level filtering rules which are configured using vendor-specific tools. System administrators start off by writing rules which implement the security po...

2008
Sandeep Bhatt Cat Okita Prasad Rao

© Fast, Cheap and In Control: A Step Towards Pain Free Security! Sandeep Bhatt, Cat Okita, Prasad Rao HP Laboratories HPL-2008-111 firewall, network, security metrics We hypothesize that it is possible to obtain significant gains in operational efficiency through the application of simple analysis techniques to firewall rule sets. This paper describes our experiences with a firewall analysis to...

Journal: :International Journal of Computer Applications 2019

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2010

2017

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

2001
Marc Éluard Thomas P. Jensen Ewen Denney

This paper presents an operational semantics for a subset of Java Card bytecode, focussing on aspects of the Java Card firewall, method invocation, field access, variable access, shareable objects and contexts. The goal is to provide a precise description of the Java Card firewall using standard tools from operational semantics. Such a description is necessary for formally arguing the correctne...

2011
Xueyang Xu Zhuoqing Morley Mao J. Alex Halderman

China filters Internet traffic in and out of the country. In order to circumvent the firewall, it is helpful to know where the filtering occurs. In this work, we explore the AS-level topology of China’s network, and probe the firewall to find the locations of filtering devices. We find that even though most filtering occurs in border ASes, choke points also exist in many provincial networks. Th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید