Academic literature on the topic 'Firewall Performance'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewall Performance.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Firewall Performance"
Mohammed, Raya Kahtan, and Yoichiro UENO. "An FPGA-based Network Firewall with Expandable Rule Description." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 3 (June 1, 2018): 1310. http://dx.doi.org/10.11591/ijeecs.v10.i3.pp1310-1318.
Full textKonikiewicz, Wojciech, and Marcin Markowski. "Analysis of Performance and Efficiency of Hardware and Software Firewalls." Journal of Applied Computer Science Methods 9, no. 1 (June 1, 2017): 49–63. http://dx.doi.org/10.1515/jacsm-2017-0003.
Full textTelkar, Prajwal S., and Dr Kiran V. "Implementation of Threat policies and Routing process in Firepower Threat Defense." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 18, 2021): 833–39. http://dx.doi.org/10.51201/jusst/21/05344.
Full textAzzam, Ahmad Thoriq, Rendy Munadi, and Ratna Mayasari. "Performance Analysis Of Firewall As Virtualized Network Function On VMware ESXi Hypervisor." JURNAL INFOTEL 11, no. 1 (March 25, 2019): 29. http://dx.doi.org/10.20895/infotel.v11i1.425.
Full textPrajapati, Gourishankar, and Nilay Khare. "A Comparative Study of Software Firewall on Windows and Linux Platform." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 8 (June 2, 2015): 5967–78. http://dx.doi.org/10.24297/ijct.v14i8.1868.
Full textXuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang, and Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.
Full textCho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (August 29, 2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.
Full textTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Full textBateni, Shirin, and Ali Asghar Khavasi. "DESIGN A SECURITY FIREWALL POLICY TO FILTER INCOMING TRAFFIC IN PACKET SWITCHED NETWORKS USING CLASSIFICATION METHODS." Ciência e Natura 38, no. 2 (May 31, 2016): 821. http://dx.doi.org/10.5902/2179460x21530.
Full textParfenov, Denis I., Irina P. Bolodurina, and Vadim A. Torchin. "Development and Study of Algorithms for the Formation of Rules for Network Security Nodes in the Multi-Cloud Platform." Modeling and Analysis of Information Systems 26, no. 1 (March 15, 2019): 90–100. http://dx.doi.org/10.18255/1818-1015-2019-1-90-100.
Full textDissertations / Theses on the topic "Firewall Performance"
Saliou, Lionel. "Network firewall dynamic performance evaluation and formalisation." Thesis, Edinburgh Napier University, 2009. http://researchrepository.napier.ac.uk/Output/2599.
Full textXu, Junjie, and Wenhui Su. "Performance Evaluations of Cisco ASA and Linux iptables Firewall Solutions." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22252.
Full textNiklasson, Carl, and Christian Lindström. "A comparative firewall study in terms of performance, security and configuration." Thesis, University West, Department of Economics and IT, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-456.
Full textThe goal of this report is to investigate firewalls from both the software and the hardware architecture on their security, functionality, effectives and how the configuration works. The test will consist of scans from Nessus and Nmap which both scans for information and vulnerabilities on the target device. The scans will be performed by first make a basic configuration of the firewall to test its base security. In the second scan will the devices be security configured and rescanned to give an overview on how secure they have become. The target software firewalls used in this test consists of a Debian 4.0, Mikrotik and a Windows 2003 server. The Debian and Windows distributions are both a full OS and have firewall capabilities while Mikrotik is a Linux distribution optimized to work as a firewall. A Cisco 2801 router will also be tested as it is a hardware device optimized for packet handling and have firewall capabilities, and as a router it's likely to already be in a company's network. Finally a Cisco ASA 5510 hardware firewall will be tested to show how a device designed as a firewall will compare to the other devices. The result shows that a Device like the ASA 5510 is clearly superior to any of the other devices in its performance, however the cost efficiency might be in question. The use of a software firewall might be more cost efficient, but might also be more vulnerable as other applications can be run at the OS.
AHMAD, MUHAMMAD ZEESHAN. "Comparative Analysis of Iptables and Shorewall." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6181.
Full textMuhammad Zeeshan Ahmad: +46-700228942
FAIRBANKS, MICHAEL STEWART. "MINIMIZING CONGESTION IN PEER-TO-PEER NETWORKS UNDER THE PRESENCE OF GUARDED NODES." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1147362818.
Full textSjöström, Linus. "Detecting SQL Injection Attacks in VoIP using Real-time Deep Packet Inspection : Can a Deep Packet Inspection Firewall Detect SQL Injection Attacks on SIP Traffic with Reasonable Performance?" Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161072.
Full textJonsson, Tomas. "LATENCY AND THROUGHPUT COMPARISON BETWEEN IPTABLES AND NFTABLES AT DIFFERENT FRAME AND RULE-SET SIZES." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15255.
Full textBrandväggar är en av de vanligaste säkerhetsverktygen som används i datornätverk. Dess syfte är att förhindra oönskad trafik att komma in på eller lämna ett datornätverk. I Linux, en av de vanligaste operativsystemkärnorna som används i serversystem, har iptables varit den rekommenderade brandväggen i nästan två årtionden men en tänkt ersättare, nftables, är tillgänglig. Detta projektet jämförde latens och genomströmning för båda brandväggarna med tio olika storlekar på regeluppsättning samt sju olika ramstorlekar genom både linjära regeluppslag och indexerade datastrukturer. Latens mättes genom tur- och returtid för ICMP-paket medan genomströmning mättes genom att generera UDP-trafik med iPerf3. Resultaten visade att, när linjära regeluppslag användes, nftables presterade sämre än iptables när små ramstorlekar användes samt när stora regeluppsättningar användes. Om ramstorleken var relativt stor samt regeluppsättningen relativt liten presterade nftables något bättre än iptables både i fråga om latens och i fråga om genomströmning. När indexerade datastrukturer användes var prestandan för bägge brandväggarna jämförbar oavsett ramstorlek eller storlek på regeluppsättning. Mindre, men statistiskt signifikanta, skillnader fanns både till nftables för- och nackdel, beroende på vilka parametrar som användes.
Sailou, Lionel. "Network firewalls dynamic performance evaluation and formalisation." Thesis, Edinburgh Napier University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.506321.
Full textSHENG-ZHENG, LIN, and 林勝政. "Performance evaluation of edge computing under the SGW and eNB -- Taking firewall as an example." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/q7c3z8.
Full text東海大學
資訊工程學系
107
In the near future, a huge amount of network will flow through the fifth generation (5G) network since a tremendous number of IOT devices/sensors will soon connect to their application platforms via 5G. In such a heavy-traffic environment, low-latency requirement will seriously impact wireless transmission security. Also, 5G adopts Software Defined Network (SDN) and Mobile Edge Computing (MEC) which conduct short transmission delays and user-defined security may be a solution. Also, in 5G due to employing small cells of small communication ranges, compared with those adopted by 4G, the number of handover will be relatively frequent, that the migration of network services or functions will be another problem yet to be solved. In this paper, we propose a firewall establishment process which installs firewalls in an EPC or eNB. We also implement a fault tolerant mechanism to detect the hardware failures in EPC and then distribute the workload of the failed network entity to other entities of the same functions following the principles of load balance. To solve the problem of frequent handover, we design a handover procedure for each of the three environments, including Intra-MME, Inter-MME and Inter-EPC, which are tightly integrated with UE handover procedure, aiming to reduce the number of transmitted messages and the time consumed by handover. Finally, we also expect that this firewall migration process can be applied to other services, e.g., the migration of instant translation function, in the near future.
Books on the topic "Firewall Performance"
Syme, Matthew, and Philip Goldie. Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing. Prentice Hall PTR, 2003.
Find full textOptimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing. Prentice Hall PTR, 2003.
Find full textBook chapters on the topic "Firewall Performance"
Beyene, Yordanos, Michalis Faloutsos, and Harsha V. Madhyastha. "SyFi: A Systematic Approach for Estimating Stateful Firewall Performance." In Passive and Active Measurement, 74–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28537-0_8.
Full textShivayogimath, Chaitra N., and N. V. Uma Reddy. "Modification of L2 Learning Switch Code for Firewall Functionality in POX Controller." In Silicon Photonics & High Performance Computing, 103–14. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7656-5_12.
Full textRoedig, Utz, and Jens Schmitt. "Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications." In Lecture Notes in Computer Science, 38–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24693-0_4.
Full textGuo, Yuan-ni, and Ren-fa Li. "Design and Performance of Firewall System Based on Embedded Computing." In Grid and Cooperative Computing, 992–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24679-4_164.
Full textGandotra, Nikita, and Lalit Sen Sharma. "Performance Evaluation and Modelling of the Linux Firewall Under Stress Test." In Lecture Notes in Electrical Engineering, 751–69. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29407-6_54.
Full textKiesel, Sebastian, and Michael Scharf. "Modeling and Performance Evaluation of SCTP as Transport Protocol for Firewall Control." In NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 451–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11753810_38.
Full textPaul, Olivier. "Improving Distributed Firewalls Performance through Vertical Load Balancing." In Lecture Notes in Computer Science, 25–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24693-0_3.
Full textNoble, Jim, Doug Maxwell, Kyle X. Hourihan, Robert Stephens, Barry J. Stiefel, Cherie Amon, and Chris Tobkin. "Performance Pack." In Check Point NG VPN-1/Firewall-1, 477–92. Elsevier, 2003. http://dx.doi.org/10.1016/b978-193183697-5/50059-0.
Full text"Troubleshooting and Performance Monitoring." In The Best Damn Firewall Book Period, 367–417. Elsevier, 2003. http://dx.doi.org/10.1016/b978-193183690-6/50052-2.
Full text"Troubleshooting and Performance Monitoring." In Cisco Security Specialist's Guide to PIX Firewall, 553–618. Elsevier, 2002. http://dx.doi.org/10.1016/b978-193183663-0/50045-1.
Full textConference papers on the topic "Firewall Performance"
Pereira, Fabio Dacencio, and Edward David Moreno Ordonez. "SSDR - Reconfigurable Firewall: Reconfiguration Model Performance." In 2008 4th Southern Conference on Programmable Logic (SPL). IEEE, 2008. http://dx.doi.org/10.1109/spl.2008.4547770.
Full textAbdul Aziz, Mohd Zafran, Muhammad Yusoff Ibrahim, Abdullatif M. Omar, Ruhani Ab Rahman, Md Mahfudz Md Zan, and Mat Ikram Yusof. "Performance analysis of application layer firewall." In 2012 IEEE Symposium on Wireless Technology & Applications (ISWTA). IEEE, 2012. http://dx.doi.org/10.1109/iswta.2012.6373838.
Full textArunwan, Mingphum, Tanachad Laong, and Kiattichai Atthayuwat. "Defensive performance comparison of firewall systems." In 2016 Management and Innovation Technology International Conference (MITicon). IEEE, 2016. http://dx.doi.org/10.1109/miticon.2016.8025212.
Full textChenghong Wang, Donghong Zhang, Hualin Lu, Jing Zhao, Zhenyu Zhang, and Zheng Zheng. "An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness." In 2014 10th International Conference on Information Assurance and Security (IAS). IEEE, 2014. http://dx.doi.org/10.1109/isias.2014.7064623.
Full textTan, J., D. Abramson, and C. Enticott. "Firewall Traversal in the Grid Architecture." In 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC 2010). IEEE, 2010. http://dx.doi.org/10.1109/hpcc.2010.108.
Full textProut, Andrew, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Matthew Hubbell, et al. "Enhancing HPC security with a user-based firewall." In 2016 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, 2016. http://dx.doi.org/10.1109/hpec.2016.7761641.
Full textXu, Jun, and Mukesh Singhal. "Design of a high-performance ATM firewall." In the 5th ACM conference. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/288090.288113.
Full textSaleous, Heba, and Zouheir Trabelsi. "Enhancing Firewall Filter Performance Using Neural Networks." In 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2019. http://dx.doi.org/10.1109/iwcmc.2019.8766576.
Full textMustafa, Umniya, Mohammad M. Masud, Zouheir Trabelsi, Timothy Wood, and Zainab Al Harthi. "Firewall performance optimization using data mining techniques." In 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013). IEEE, 2013. http://dx.doi.org/10.1109/iwcmc.2013.6583682.
Full textSay, Tamer, Mustafa Alkan, Murat Dorterler, and Ibrahim Alper Dogru. "CPU Performance Test of A Home Firewall." In 2018 3rd International Conference on Computer Science and Engineering (UBMK). IEEE, 2018. http://dx.doi.org/10.1109/ubmk.2018.8566302.
Full textReports on the topic "Firewall Performance"
Hickman, B., D. Newman, S. Tadjudin, and T. Martin. Benchmarking Methodology for Firewall Performance. RFC Editor, April 2003. http://dx.doi.org/10.17487/rfc3511.
Full textNewman, D. Benchmarking Terminology for Firewall Performance. RFC Editor, August 1999. http://dx.doi.org/10.17487/rfc2647.
Full text