نتایج جستجو برای: firewall

تعداد نتایج: 4739  

Journal: :CLEI Electronic Journal 1998

2013
Loye L. Ray

Firewalls are core elements in network security, the effectiveness of firewall security is dependent on configuring the firewall policy correctly. A firewall policy describes the access that will be permitted or denied from the trusted network. In a corporate network several firewalls are setup and administrated by different individuals. The consistency between those firewall policies is crucia...

2004
Alex X. Liu Mohamed G. Gouda Huibo H. Ma Anne H. H. Ngu

Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is to examine each incoming and outgoing packet and decide whether to accept or to discard the packet based on a sequence of rules. Because a firewall may have a large number of rules and the rules often conflict, underst...

Journal: :Future Generation Comp. Syst. 2014
Xiangjian He Thawatchai Chomsiri Priyadarsi Nanda Zhiyuan Tan

This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., ListedRule firewalls) have their limitations in performing the tasks and are inapplicable for working on some networks with huge firewall rule sizes. The Listed-Rule firewall is mathemati...

2014
V. Hima Bindu G. Devi Abdul Vahed

Firewalls have been broadly organized on the Internet aimed at acquiring secluded systems. A firewall forms every received or departing packet towards to choose whether to receive or reject the packet grounded on its strategy. Improving firewall strategies is vital aimed at enlightening system performance. Earlier effort on firewall optimization emphases on both intra firewall or inter firewall...

Journal: :IJIPT 2010
Muhammad Arshad Ul Abedin Syeda Nessa Latifur Khan Ehab Al-Shaer Mamoun A. Awad

The firewall is usually the first line of defense in ensuring network security for an organization. However, the management of firewalls has proved to be complex, error-prone, and costly for many large-networks. Manually configured firewall rules can easily contain anomalies and mistakes. Even if the rules are anomaly-free, the presence of defects in the firewall implementation, or the firewall...

Journal: :Computers & Security 2003
Seny Kamara Sonia Fahmy E. Eugene Schultz Florian Kerschbaum Michael Frantzen

Firewalls protect a trusted network from an untrusted network by filtering traffic according to a specified security policy. A diverse set of firewalls is being used today. As it is infeasible to examine and test each firewall for all possible potential problems, a taxonomy is needed to understand firewall vulnerabilities in the context of firewall operations. This paper describes a novel metho...

2015
V. Varalakshmi

Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis tools, such as Firewall Policy Advisor and FIREMAN, they can only detect the policy anomaly cannot resolve these anomalies, and detection time was also increased. Therefore, I re...

2008
Pooya Jaferian

Windows Vista is shipped with a built-in personal firewall. The firewall has lots of new features over its predecessor, XP’s firewall. But, previous studies showed that Vista’s firewall have a set of usability problems. The goal of this paper is to address the lack of a complete and validated prototype of improved Vista’s firewall interface. By providing a high-fidelity prototype that could be ...

2003
Yuan-ni Guo Renfa Li

Conventional firewall has failed to resist the attack from the inside network and distributed firewall excessively relies on the host operation system, therefore embedded firewall become the focus of the current network security research. The paper discusses the design and implementation of firewall system based on embedded computing. In addition, it presents architecture of embedded firewall, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید