Academic literature on the topic 'Firewall'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewall.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Firewall"

1

Umm e Khadija and Iqra Saqib. "Comparison Of Different Firewalls Performance In A Virtual For Cloud Data Center." Journal of Advancement in Computing 1, no. 1 (2023): 21–28. http://dx.doi.org/10.36755/jac.v1i1.49.

Full text
Abstract:
Every data centre, whether virtual or physical, relies on its network, and the firewall is an essential part of that network for safe communication. Data centre connection can be protected by a variety of firewall types, including software firewalls, physical firewalls, virtual appliance firewalls, and kernel-integrated firewalls. There are several factors to consider when selecting a firewall, especially in a virtualized data centre, where each firewall works differently in different situations. Virtualized data centres are intended to yield lower budgets, efficient management extensibility, better utilization of available resources, scalability, and energy resilience, among several other advantages. Virtualized data centres are the topic of this study, which examines the application of firewalls. The performance of various types of firewalls, such as software firewalls, physical firewalls, virtual appliance firewalls, and kernel-integrated firewalls, is being analysed. Virtual data centre firewall implementation and performance comparisons explain how to design and which firewall type provides the best performance. In all conditions, it was shown that kernel-integrated firewalls worked properly. Virtual machine IP addresses and networks can vary, and the kernel-based firewall can dynamically update its rules to keep pace with such changes. With its distributed firewall functionality, virtual machines can travel across hypervisors with no disruption to their security settings, if their policies remain the same. A kernel-based, distributed firewall is the best way to protect against viruses.
APA, Harvard, Vancouver, ISO, and other styles
2

Hanane Aznaoui and Canan Batur Şahin. "A Virtual Data Center Comparison Of Different Firewalls' Performance." Journal of Advancement in Computing 1, no. 1 (2023): 1–8. http://dx.doi.org/10.36755/jac.v1i1.46.

Full text
Abstract:
Whether virtual or real, every data centre depends on its network, and the firewall is a crucial component of that network for secure communication. Different types of firewalls, such as software firewalls, physical firewalls, virtual appliance firewalls, and kernel-integrated firewalls, can secure data centre connections. When choosing a firewall, there are many things to take into account, especially in a virtualized data centre where each firewall behaves differently depending on the situation. Reduced costs, effective administration extensibility, greater resource usage, scalability, and energy resilience are just a few benefits that virtualized data centres are supposed to produce. In this study, the use of firewalls is examined in relation to virtualized data centres. The effectiveness of several kinds of firewalls, including virtual firewalls, physical firewalls, and software .The performance of various types of firewalls, such as software firewalls, physical firewalls, virtual appliance firewalls, and kernel-integrated firewalls, is being analysed. Virtual data centre firewall implementation and performance comparisons explain how to design and which firewall type provides the best performance. In all conditions, it was shown that kernel-integrated firewalls worked properly. Virtual machine IP addresses and networks can vary, and the kernel-based firewall can dynamically update its rules to keep pace with such changes.
APA, Harvard, Vancouver, ISO, and other styles
3

Khummanee, Suchart, Panida Songram, and Potchara Pruksasri. "FFF: Fast Firewall Framework to Enhance Rule Verifying over High-speed Networks." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (2022): 35–47. http://dx.doi.org/10.37936/ecti-cit.2022161.246990.

Full text
Abstract:
The current traffic trend on computer networks is growing exponentially, affecting network firewalls because they constantly have to filter out massive amounts of data. In this paper, we implement a firewall framework to improve traffic processing speed, named the Fast Firewall Framework (FFF). FFF can verify rules at Big-O(1) worst-case access time, and it also consumes a small amount of memory, which is only Big-O(nbit). To evaluate the firewalls' effectiveness, we benchmark the proposed firewall framework against the two fastest firewalls (The state of the art of opensource firewall), IPSets and IPack. The experimental results show that the Fast Firewall Framework can execute rules faster than both firewalls and consumes less memory. In particular, the proposed firewall framework has a simple structure that makes it easier to implement.
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Sachin. "To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set." International Journal of Advance Research and Innovation 2, no. 4 (2014): 17–26. http://dx.doi.org/10.51976/ijari.241404.

Full text
Abstract:
Firewall is a most crucial element to implement security policies in a network and also crucial to success of network rather say to success of an organization. Despite of its important in any network it has many problems and one of them is increasing number of rules in firewall’s rule set. Since in today’s environment, enterprises looking to provide strongest security to their users and also want to secure their data at maximum level and hence they have increased rules in firewall’s rule set. However increasing number of rules in firewall rule set is not an efficient way to provide maximum security. And this study shows that how can the use of minimum number of rules in firewall rule set to implement optimum security is possible. It has also proved that this problem of minimizing maximum firewall rule set in network is NP complete. One point is noteworthy to mention here that in today’s time as enterprises are moving towards cloud technology the complexity at data center is increased and it is being difficult to implement security in clouds. So by having highly optimized firewalls, it is possible that they can be used to provide security in clouds.
APA, Harvard, Vancouver, ISO, and other styles
5

Qian, Xinyang. "Network security and computer program." Applied and Computational Engineering 5, no. 1 (2023): 744–49. http://dx.doi.org/10.54254/2755-2721/5/20230688.

Full text
Abstract:
In this era of rapid development of network and computer technology, the potential dangers become more and more numerous. There are many security issues that are hidden and unobtrusive. Creating a computer firewall to defend against network security leaks is a necessity. Firewalls can be personal and make a match that is more in line with what is in mind. Firewalls must allow any necessary connections from application business and technical expertise through the firewall to ensure the integrity of the data network. For firewall pairings, Border network, Perimeter Network, and Internal Network are also necessary for impact. The firewall construction can also be made more secure by implementing it through WIFI IP address. Dynamic NAT, Static NAT and PAT are essential in firewall building, and they all aim at network address translation. When building a firewall, changing a specific IP address can monitor the own network and control the message delivery in terms of security.
APA, Harvard, Vancouver, ISO, and other styles
6

Alicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (2021): 283. http://dx.doi.org/10.3390/fi13110283.

Full text
Abstract:
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles’ misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.
APA, Harvard, Vancouver, ISO, and other styles
7

Lindqvist, Janne, Essi Vehmersalo, Miika Komu, and Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." International Journal of Handheld Computing Research 1, no. 1 (2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.

Full text
Abstract:
Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile clients. The HIP-based firewall learns the identity of a client when it communicates with the server over HIP. The firewall configures the necessary rules based on HIP control messages passing through the firewall. The solution is secure and flexible, and introduces only minimal latency to the initial HIP connection establishment.
APA, Harvard, Vancouver, ISO, and other styles
8

Singleton, Douglas. "Non-Abelian firewall." International Journal of Modern Physics D 29, no. 14 (2020): 2043003. http://dx.doi.org/10.1142/s0218271820430038.

Full text
Abstract:
A simple, closed-form solution to the Yang-Mills field equations is presented which has a non-Abelian firewall — a spherical “horizon” where the energy density diverges. By the gravity/gauge duality, this non-Abelian firewall implies the existence of a gravitational firewall. Gravitational firewalls have been proposed as a way of resolving the information loss paradox, but at the cost of violating the equivalence principle.
APA, Harvard, Vancouver, ISO, and other styles
9

Periyasamy, A. R. Pon. "Security Issues of Firewall." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.

Full text
Abstract:
The need of Network Security is accelerating at the same pace as that of increased Internet usage. Network Security prevents from illegitimate admittance, hacking andauthentic data transportation. Network Security consist of provisions and policies adopted by a network administrator to preclude and monitor unauthorized access, alterations, perversion, declination of a computer network and network-accessible resources. Network Security is achieved by Firewall. Firewall is a hardware or software device which is designed to permit or refuse network transmissions based upon certain protocols. Firewall is a locus at the endpoints of the system which strains out all illegitimate traffic and users. But conventional or traditional firewalls rely stricly on the restricted topology and restrained entry points to function; which results in difficulty in filtering certain protocols, end-to-end encryption problem etc. Hence, it resulted in the evolution of Distributed Firewall which strengthens the network security policies without delimitating its topology from inside or outside. Distributed Firewall is a host-resident security software application that protects the enterprise network’s servers and end-user machines against unwanted intrusion. This paper is a literature review paper focusing on traditional firewalls, it evolution, security issues various policies and the concept of distributed firewall.
APA, Harvard, Vancouver, ISO, and other styles
10

Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.

Full text
Abstract:
Attempts at unauthorized intrusion occur quite often, even after the adoption of the necessary security policies and practices for the information network. These are attacks in which an attacker gains access to the system using various hacking techniques. A firewall is a hardware and software-based network security system that uses certain rules to manage incoming and outgoing network packets. The firewall controls access to network resources through a positive management model. There are various traditional firewalls, such as packet filters, program-level gateways, and chip-level gateways, which have their pros and cons. To overcome the shortcomings of the traditional firewall, a new generation of firewalls is introduced. The article presents the study of traditional firewalls and their evolution to a new generation firewall and its benefits. New firewalls still belong to the third generation, but are often referred to as the "next generation" or NGFW. This type combines all previously used approaches with an in-depth review of filtered content and its comparison with a database to identify potentially dangerous traffic. Modern firewalls often have built-in additional security systems: virtual private networks (VPNs), intrusion prevention and detection systems (IPS / IDS), authentication management, application management, and web filtering. Their state-of-the-art technology can filter outbound traffic. This helps reduce the likelihood of data theft by attackers. In addition, an important function of the firewall is to reduce the risk of devices becoming part of a botnet (a malicious network with a large group of devices controlled by cybercriminals).
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Firewall"

1

Höfler, Torsten, Christian Burkert, and Martin Telzer. "Comparative Firewall Study." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kugler, Zdeněk. "Proxy firewall." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218057.

Full text
Abstract:
This diploma thesis deals with the topic of proxy servers and firewalls and considers other associated technologies and network techniques. It systematically describes the general issues of firewalls, with a special focus on proxy firewalls and their safety. Additional systems mentioned in this document are intrusion detection systems (IDS), antivirus systems and content control filters – as these are also connected with safety of networks, servers and workstations or with limiting various Internet sources. IDS systems can be typically supplemented with various additional applications or tools that enrich them and increase their potential – including graphic additions. This part is remembered too. Some systems can communicate with each other, which is successfully utilised (FW & IDS co-operation, for example). The purpose of the first large chapter is to present firewall technologies, to list firewall types, their basic functionality and to present the final comparison. It marginally mentions firewall applications in practice. Chapter two explains the theory of network address translation (NAT), deals with its functionality, safety and with limiting the NAT mechanism. Chapter three brings a comprehensive presentation of proxy servers. It explains their principle from the point of view of functionality and the specification of application areas. The chapter is complete with a clear list of proxy server types and their descriptions. The last chapter named Linux Proxy Firewall is the key part of the work. It deals generally with the Linux platform, the Debian GNU/Linux distribution, principles of safety policy, network configuration, network server safety, Linux firewalls (Netfilter framework, Iptables tool) and with the Squid proxy server. The following subchapters respect the previous structure: they describe the theories of intrusion detection systems, antivirus checks and content filtering based on different methods. All this is presented similarly to the previous chapters. A proxy firewall solution built on the Linux operating system has been proposed in the practical part. The Debian GNU/Linux distribution has been chosen, being very suitable for server use due to its features. This environment is also used for additional safety software contained in the proxy firewall: antivirus protection, content filtering and an intrusion detection system. The priority is the most comprehensive computer network security, which requires detection abilities with the broadest possible coverage in the area of network safety. The purpose of this diploma thesis is not only to describe the principle of operation of proxy servers and to compare them with other types and other systems, but it also brings my own proposed free solution, which increases network safety and has the ambition of comparing it with clearly commercial products available on the market.
APA, Harvard, Vancouver, ISO, and other styles
3

Bonnevier, Jani, and Sebastian Heimlén. "The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067.

Full text
Abstract:
Firewalls help protect computer networks from intrusions and malware by enforcing restrictions on what network traffic is allowed to pass through the firewall into the network. This thesis explores the role of firewalls in network security, with the ultimate goal of advancing attempts to create a threat model for firewalls. Five areas are explored, namely: Definitions of Concepts Firewalls vs. Services as Targets for Direct Attack The Past and Future of Firewalls Approach to Estimating Firewall Security Firewall Configuration and Security Policies These areas are explored using a questionnaire survey. Each question in the questionnaire is either tied to a particular area, or is used to evaluate the respondents’ credibility. The questionnaire has 15 questions, many of which ask for free text answers. The group of potential respondents consists of 209 individuals, of whom about 75 % are authors of scientific articles that discuss firewalls, penetration testing, and other relevant topics. The rest are information security professionals, journalists or bloggers of varying merit that were found online. 20 responses to the questionnaire were received. Responses to qualitative questions were codified to produce some quantitative data. The conclusions drawn based on the results include, among other things: Attackers tend to directly target network services rather than firewalls. Respondents disagreed on whether the role of firewalls is currently changing. A possible approach to estimating firewall security takes into account the network services that the firewall protects. Firewall configurations frequently do not match the security policies of the organizations in which the firewalls are deployed.<br>Brandväggar hjälper att skydda datornätverk från intrång och skadeprogram genom att begränsa den trafik som tillåts passera genom brandväggen in i nätverket. Denna uppsats utforskar brandväggars roll i nätverkssäkerhet med målet att göra framsteg i försök att skapa en hotmodell för brandväggar. Fem områden utforskas, nämligen: Definitioner av begrepp Brandväggar kontra tjänster som mål för direkta angrepp Brandväggens historia och framtid Tillvägagångssätt för att estimera brandväggssäkerhet Brandväggskonfiguration och säkerhetspolicyer Dessa områden utforskas via en enkätstudie. Varje fråga i enkäten tillhör antingen ett specifikt område, eller används för att evaluera respondenternas trovärdighet. Enkäten har 15 frågor, varav många efterfrågar fritextsvar. Gruppen potentiella respondenter består av 209 individer, varav cirka 75 % är författare av vetenskapliga artiklar som behandlar brandväggar, penetrationstestning och andra relevanta ämnen. Resten är professionella säkerhetskonsulter, journalister eller bloggare med olika meriter inom informationssäkerhet eller nätverk. 20 svar på enkäten togs emot. Svar på kvalitativa frågor klassificerades för att producera kvantitativ data. Slutsatserna som drogs baserat på resultaten inkluderar bl.a.: Angripare tenderar att ha nätverkstjänster som sina direkta mål, snarare än brandväggar. Respondenterna var oense om huruvida brandväggars roll just nu förändras. Ett möjligt tillvägagångssätt för att uppskatta brandväggssäkerhet tar hänsyn till de nätverkstjänster brandväggen skyddar. Brandväggskonfigurationer överrenstämmer ofta inte med säkerhetsriktlinjerna i de organisationer där brandväggarna är i bruk.
APA, Harvard, Vancouver, ISO, and other styles
4

Horowitz, Eduardo. "Estudo sobre a extração de políticas de firewall e uma proposta de metodologia." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/12075.

Full text
Abstract:
Com o aumento das ameaças na Internet, firewalls tornaram-se mecanismos de defesa cada vez mais utilizados. No entanto, sua configuração é notadamente complexa, podendo resultar em erros. Vários estudos foram realizados com o intuito de resolver tais problemas, mas a grande maioria deles se concentrou em trabalhar diretamente no nível de configuração, o que possui limitações. O presente trabalho investiga maneiras de extrair políticas em mais alto nível a partir de regras de firewall em baixo nível, o que é mais intuitivo. A fim de extrair as políticas reais a partir de regras de firewall, o problema do descorrelacionamento é estudado e algoritmos anteriormente propostos para resolvê-lo são apresentados e discutidos. É apresentado, também, um tipo de grafo para a melhor visualização e análise de correlacionamento entre regras. Além disso, é pesquisado o agrupamento de regras descorrelacionadas, que tem o objetivo de elevar o nível das mesmas. São apresentados dois algoritmos para realizar o agrupamento, sendo um deles novo. A seguir, é proposta uma nova metodologia de extração de políticas de firewall. A primeira parte desta consiste na utilização de um novo tipo de descorrelacionamento, o descorrelacionamento hierárquico. Este é acompanhado por uma nova maneira de agrupar regras descorrelacionadas hierarquicamente, o agrupamento hierárquico. A segunda parte é uma nova modelagem de regras de firewall que fazem parte de blacklist ou whitelist, separando-as das demais regras na extração de políticas. Algumas maneiras de realizar esta separação também são discutidas. Por fim, são relatadas as conclusões e possibilidades de trabalhos futuros.<br>As the number of threats in the Internet grows, firewalls have become a very important defense mechanism. However, configuring a firewall is not an easy task and is prone to errors. Several investigations have been made towards solving these issue. However, most of them have focused on working directly at the configuration level and have a number of limitations. This work investigates methods to extract higher level policies from low level firewall rules. Aiming at extracting real policies from firewall rules, we analyse the firewall decorrelation problem and previously proposed algoritmhs to solve it. In addition, a new type of graph is presented aiming at better visualising and analysing rules’ correlation. We also investigate the merging of decorrelated rules, with the goal of defining more abstract rules. Two algorithms are then presented and a new methodology for the extraction of firewall policies is proposed. This methodology is twofold. The first part consists of the use a new type of decorrelation: the hierachical decorrelation, which is introduced along with a new way of hierarchically merging decorrelated rules. The second part is a new model for blacklist or whitelist firewall rules, separating them from the other rules in the policy extraction. We also present alternatives for accomplishing this separation. Finally, we conclpude and point out directions for future work.
APA, Harvard, Vancouver, ISO, and other styles
5

Bidder-Senn, Diana von. "Specification-based firewall testing /." Zürich : ETH, 2007. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=17172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Žižka, Martin. "Stavový firewall v FPGA." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236618.

Full text
Abstract:
This thesis describes the requirements analysis, design and implementation of stateful packet filtering to an existing stateless firewall. They also deals with testing of the implemented system. The first two chapters describe the properties NetCOPE development platform for FPGA. They also describes the principle of operation           firewall, which also serves as a requirements specification for stateful firewall. Then describes the detailed design of individual modules to modify the existing firewall and the proposal for the creation of new modules. It also discusses the implementation of the proposed modules and testing for proper operation. Finally, it discuss the current state of the thesis and describes possible future expansion.
APA, Harvard, Vancouver, ISO, and other styles
7

Jehmlich, Heiko. "Firewall mit nutzerindividuellen Regeln." [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10806306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Voronkov, Artem. "Usable Firewall Rule Sets." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-64703.

Full text
Abstract:
Correct functioning is the most important requirement for any system. Nowadays there are a lot of threats to computer systems that undermine confidence in them and, as a result, force a user to abandon their use. Hence, a system cannot be trusted if there is no proper security provided. Firewalls are an essential component of network security and there is an obvious need for their use. The level of security provided by a firewall depends on how well it is configured. Thus, to ensure the proper level of network security, it is necessary to have properly configured firewalls. However, setting up the firewall correctly is a very challenging task. These configuration files might be hard to understand even for system administrators. This is due to the fact that these configuration files have a certain structure: the higher the position of a rule in the rule set, the higher priority it has. Challenging problems arise when a new rule is being added to the set, and a proper position, where to place it, needs to be found. Misconfiguration might sooner or later be made and that will lead to an inappropriate system's security. This brings us to the usability problem associated with the configuration of firewalls. The overall aim of this thesis is to identify existing firewall usability gaps and to mitigate them. To achieve the first part of the objective, we conducted a series of interviews with system administrators. In the interviews, system administrators were asked about the problems they face when dealing with firewalls. After having ascertained that the usability problems exist, we turned to literature to get an understanding on the state-of-the-art of the field and therefore conducted a systematic literature review. This review presents a classification of available solutions and identifies open challenges in this area. To achieve the second part of the objective, we started working on one identified challenge. A set of usability metrics was proposed and mathematically formalized. A strong correlation between our metrics and how system administrators describe usability was identified.<br>Network security is an important aspect that must be taken into account. Firewalls are systems that are used to make sure that authorized network traffic is allowed and unauthorized traffic is prohibited. However, setting up a firewall correctly is a challenging task. Their configuration files might be hard to understand even for system administrators. The overall aim of this thesis is to identify firewall usability gaps and to mitigate them. To achieve the first part of the objective, we conduct a series of interviews with system administrators. In the interviews, system administrators are asked about the problems they face when dealing with firewalls. After having ascertained that the usability problems exist, we conduct a systematic literature review to get an understanding on the state of the art of the field. This review classifies available solutions and identifies open challenges. To achieve the second part of the objective, a set of usability metrics is proposed and mathematically formalized. A strong correlation between our metrics and how system administrators describe usability is identified.<br>HITS, 4707
APA, Harvard, Vancouver, ISO, and other styles
9

Rumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rödig, Utz. "Firewall-Architekturen für Multimedia-Applikationen." [S.l. : s.n.], 2002. http://elib.tu-darmstadt.de/diss/000276.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Firewall"

1

McNab, Andy. Firewall. BCA, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mankell, Henning. Firewall. Blackstone Audio, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

McNab, Andy. Firewall. Transworld, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

McNab, Andy. Firewall. Bantam Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

McNab, Andy. Firewall. Pocket Books, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mankell, Henning. Firewall. ISIS, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pineiro, R. J. Firewall. Tom Doherty Associates Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

McNab, Andy. Firewall. Pocket Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Firewall. Forge, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

McNab, Andy. Firewall. Pocket Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Firewall"

1

Weik, Martin H. "firewall." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Provos, Niels. "Firewall." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Neel, Andrew J. "Firewall." In Encyclopedia of Sciences and Religions. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-1-4020-8265-8_201152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rennie, Frank, and Keith Smyth. "Firewall." In Digital Learning: The Key Concepts, 2nd ed. Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pohlmann, Norbert. "Firewall-Systeme." In Cyber-Sicherheit. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-25398-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weik, Martin H. "firewall component." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weik, Martin H. "firewall principle." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lenhard, Thomas H. "Die Firewall." In Datensicherheit. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29866-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Alex X., Mohamed G. Gouda, Huibo H. Ma, and Anne HH Ngu. "Firewall Queries." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11516798_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lenhard, Thomas H. "Die Firewall." In Datensicherheit. Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-17983-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Firewall"

1

Acharya, H. B., Aditya Joshi, and M. G. Gouda. "Firewall modules and modular firewalls." In 2010 18th IEEE International Conference on Network Protocols (ICNP). IEEE, 2010. http://dx.doi.org/10.1109/icnp.2010.5762766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Costa Júnior, Edmilson P. da, Silas T. Medeiros, Carlos Eduardo da Silva, and Marcos Madruga. "An Architecture for Self-adaptive Distributed Firewall." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19318.

Full text
Abstract:
The notion of secure perimeter given by border firewalls ignores the possibility of attacks originating from inside the network. Although distributed firewalls allow the protection of individual hosts, the provided services might still be susceptible to attacks, as firewalls usually do not analyze application protocols. In this way, software vulnerabilities may be exploited until the problem has been fixed. From vulnerability discovery to the application of patches there is an exposure window that should be reduced. In this context, this paper presents an architecture for a distributed firewall system, in which a Vulnerability Assessment System is integrated for providing a self-adaptive mechanism capable of detecting vulnerabilities and executing actions to reduce exposure, contributing to mitigate the risk of vulnerability exploitation.
APA, Harvard, Vancouver, ISO, and other styles
3

Fiorenza, Maurício, Diego Kreutz, and Rodrigo Mansilha. "Gerenciamento de Firewalls em Redes Híbridas." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19260.

Full text
Abstract:
O gerenciamento de firewalls é um processo desafiador em redes híbridas, pois envolve aplicar políticas de segurança em soluções tradicionais (e.g., Cisco NGFW, IPTables) e emergentes (e.g., OpenFlow, P4, e POF). Neste trabalho é proposta e discutida uma arquitetura, organizada em uma pilha de camadas, para gerência integrada de firewalls em redes híbridas. Como prova de conceito, foi implementado um protótipo que gera a configuração de regras para diferentes soluções de firewall. O protótipo foi avaliado experimentalmente através de testes de continuidade de tráfego (bloqueio e liberação) e limite de tráfego (traffic shaping).
APA, Harvard, Vancouver, ISO, and other styles
4

Oliveira, Muryllo Pimenta de, and Carlo Marcelo Revoredo da Silva. "MinimalisticWAF: Um Web Application Firewall baseado em ganchos de APIs I/O." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg_estendido.2020.19279.

Full text
Abstract:
Muitos servidores na web são protegidos somente por firewalls baseados em proxy e são vulneráveis à ataques direcionados à protocolos da camada de aplicação. Esse artigo aborda um modelo de firewall standalone que fica residente na camada de aplicação exigindo o mínimo de alterações possível na implementação. Resultados mostraram que a tecnologia conteve diversos ataques no endereço real do servidor oriundos de botnets procurando por serviços de bancos de dados vulneráveis, aplicações com livre acesso a upload de arquivos e rotas com autenticações e interpretadores de código shell quebrados. Essa proteção foi obtida por meio de técnicas de gancho de funções de escrita e leitura no soquete de rede e comparações com a pilha de listas discricionárias de acesso e filtros de requisições presentes no firewall. Inferiu-se, portanto, que o Minimalistic WAF fornece proteção auxiliar às aplicações hospedadas em servidores node.js que sofrem ataques diretos ao endereço real, tornando a aplicação duplamente protegida.
APA, Harvard, Vancouver, ISO, and other styles
5

Shaikh, Zubair A., and Furqan Ahmed. "Disarming firewall." In 2010 International Conference on Information and Emerging Technologies (ICIET). IEEE, 2010. http://dx.doi.org/10.1109/iciet.2010.5625739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fu, Guangrui, Daichi Funato, Jonathan Wood, and Toshiro Kawahara. "Mobile Firewall." In Proceedings of the Fifth IFIP-TC6 International Conference. WORLD SCIENTIFIC, 2003. http://dx.doi.org/10.1142/9789812791146_0063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khakpour, Amir R., Joshua W. Hulst, Zihui Ge, Alex X. Liu, Dan Pei, and Jia Wang. "Firewall fingerprinting." In IEEE INFOCOM 2012 - IEEE Conference on Computer Communications. IEEE, 2012. http://dx.doi.org/10.1109/infcom.2012.6195544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liang, Junyan, and Yoohwan Kim. "Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall." In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2022. http://dx.doi.org/10.1109/ccwc54503.2022.9720435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, A. X., E. Torng, and C. R. Meiners. "Firewall Compressor: An Algorithm for Minimizing Firewall Policies." In 27th IEEE International Conference on Computer Communications (INFOCOM 2008). IEEE, 2008. http://dx.doi.org/10.1109/infocom.2007.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, A. X., E. Torng, and C. R. Meiners. "Firewall Compressor: An Algorithm for Minimizing Firewall Policies." In IEEE INFOCOM 2008 - IEEE Conference on Computer Communications. IEEE, 2008. http://dx.doi.org/10.1109/infocom.2008.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Firewall"

1

Wack, John, Ken Cutler, and Jamie Pole. Guidelines on firewalls and firewall policy :. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scarfone, K. A., and P. Hoffman. Guidelines on firewalls and firewall policy. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-41r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bellovin, S. Firewall-Friendly FTP. RFC Editor, 1994. http://dx.doi.org/10.17487/rfc1579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Humenn, Polar, and Dan Nessett. The Multilayer Firewall. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada385371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gaynor, M., and S. Bradner. Firewall Enhancement Protocol (FEP). RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Newman, D. Benchmarking Terminology for Firewall Performance. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hickman, B., D. Newman, S. Tadjudin, and T. Martin. Benchmarking Methodology for Firewall Performance. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

HUDSON, JACK A., and GERALD F. RUDOLFO. Experiences from Evaluating Telephone Firewall Systems. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/808626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Montenegro, G., and V. Gupta. Sun's SKIP Firewall Traversal for Mobile IP. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stiemerling, M., H. Tschofenig, C. Aoun, and E. Davies. NAT/Firewall NSIS Signaling Layer Protocol (NSLP). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!