نتایج جستجو برای: firewall

تعداد نتایج: 4739  

Journal: :CoRR 2011
Nenad Stojanovski Marjan Gusev

Classic firewall systems are built to filter traffic based on IP addresses, source and destination ports and protocol types. The modern networks have grown to a level where the possibility for users’ mobility is a must. In such networks, modern firewalls may introduce such complexity where administration can become very frustrating since it needs the intervention of a firewall administrator. Th...

2007
Taghrid Samak Adel El-Atawy Ehab Al-Shaer

A firewall policy that is correct and complete is crucial to the safety of a computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this paper, we propose a framework that could be used to blindly discover a firewall policy without prior knowledge. We show how an attacker can reconstruct a firewall’s policy by probing the firewall with tailored packets in...

Journal: :Inf. Manag. Comput. Security 2002
Mayur S. Desai Thomas C. Richards Thomas von der Embse

The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Before choosing a firewall architecture, a company must have...

Journal: :General Relativity and Gravitation 2015

2009
Sergio Pozo Hidalgo Angel Jesus Varela-Vaca Rafael M. Gasca

The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-level language with a different functionality, syntax, and development environment. Although several high-level languages have been proposed to model firewall access control policies, none of them has been widely adopted by the i...

2001
Yongyuth Permpoontanalarp Chaiwat Rujimethabhas

Firewalls offer a protection for private networks against external attacks. However, configuring firewalls correctly is a difficult task. There are two main reasons. One is that the effects of a firewall configuration cannot be easily seen during the configuration time. Another one is the lack of guidance to help configuring firewalls. In this paper, we propose a general and unified methodology...

2007
Grzegorz J. Nalepa

The paper presents a concept of support for the design and analysis of Internet security systems with a rule-based methodology. It considers a web security architecture, including a network and applicationlevel firewall with intrusion detection systems. The XTT methodology allows for hierarchical design, and on-line analysis of rule-based systems. It is applied using the Unified Firewall Model,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید