To see the other types of publications on this topic, follow the link: Firewall Policy.

Journal articles on the topic 'Firewall Policy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Firewall Policy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hakani, Dhwani, and Palvinder Singh Mann. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 141. https://doi.org/10.11591/ijict.v14i1.pp141-152.

Full text
Abstract:
<p>Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall’s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called “TreeRule Firewall,” which has benefits and functions effectively in large-scale networks
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Sachin. "To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set." International Journal of Advance Research and Innovation 2, no. 4 (2014): 17–26. http://dx.doi.org/10.51976/ijari.241404.

Full text
Abstract:
Firewall is a most crucial element to implement security policies in a network and also crucial to success of network rather say to success of an organization. Despite of its important in any network it has many problems and one of them is increasing number of rules in firewall’s rule set. Since in today’s environment, enterprises looking to provide strongest security to their users and also want to secure their data at maximum level and hence they have increased rules in firewall’s rule set. However increasing number of rules in firewall rule set is not an efficient way to provide maximum sec
APA, Harvard, Vancouver, ISO, and other styles
3

Jha, Ashutosh Chandra. "Automated Firewall Policy Generation with Reinforcement Learning." International journal of IoT 5, no. 1 (2025): 190–211. https://doi.org/10.55640/ijiot-05-01-10.

Full text
Abstract:
Network security would be incomplete without firewalls that control traffic flow through rule-based policies. The manual way to configure and manage firewall rules, however, is prone to various pitfalls; rules tend to become overly complex, human error occurs, and cyber threats continue to evolve. This work investigates the reinforcement learning (RL) - driven method for firewall policy generation, utilizing RL as an automated means for policy generation to increase adaptability and reduce administrative overhead. The proposed system utilizes RL agents that learn an optimal policy from real-ti
APA, Harvard, Vancouver, ISO, and other styles
4

Dhwani, Hakani, and Singh Mann Palvinder. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 141–52. https://doi.org/10.11591/ijict.v14i1.pp141-152.

Full text
Abstract:
Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall’s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called “TreeRule Firewall,” which has benefits and functions effectively in large-scale
APA, Harvard, Vancouver, ISO, and other styles
5

Lindqvist, Janne, Essi Vehmersalo, Miika Komu, and Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." International Journal of Handheld Computing Research 1, no. 1 (2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.

Full text
Abstract:
Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile cli
APA, Harvard, Vancouver, ISO, and other styles
6

Telkar, Prajwal S., and Dr Kiran V. "Implementation of Threat policies and Routing process in Firepower Threat Defense." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 833–39. http://dx.doi.org/10.51201/jusst/21/05344.

Full text
Abstract:
A firewall is a guard of the network which inspects the packets based on the rules adopted to be executed in the threat environment. This is used to block the flow of undesirable content, forbids unauthorized remote access, and impedes immoral contents, assures security based on protocol and IP address, insulates seamless activity in Enterprise networks, shields conversation and coordination contents and thus this cybersecurity tool secures the system when administering on the internet with humongous amount of malicious data threatening the performance and data of the network structure. Cisco’
APA, Harvard, Vancouver, ISO, and other styles
7

Altamezvi, Alnuman Mohammed Abubaker, Abdulwahed Omran E. Alalwani, and Ashour Alsllami. "Comparing Context Based Access Control to Zone-based Policy Firewalls." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 1215–22. http://dx.doi.org/10.22214/ijraset.2022.44006.

Full text
Abstract:
Abstract: This paper will be introducing a comparative study on the choices between two best classical software firewalls one is Context Based Access Control (CBAC) and Zone Based firewall (ZBF). Both of them may deliver a stateful inspection of TCP, UDP and/or ICMP control packets. Through this study, two type of networks were designed one used the CBAC firewall and the other works with a zone based firewall. The result obtained showed that ZBF has several feature which are not available in CBAC. Furthermore, ZBF deals with the security zones the traffic will be dynamically inspected as it pa
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, A. X., and M. G. Gouda. "Firewall Policy Queries." IEEE Transactions on Parallel and Distributed Systems 20, no. 6 (2009): 766–77. http://dx.doi.org/10.1109/tpds.2008.263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dr. Parvathi S, Raj shekhar Singh, Simpal Kumari, and Sudhanshu Kumar. "Dynamic AI-Augmented Firewall for Real-Time Threat Mitigation." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 353–57. https://doi.org/10.47392/irjaeh.2025.0049.

Full text
Abstract:
Firewalls are an integral part of network protection against intrusions, their traditional approaches of sticking to static rules have rendered firewalls ineffective when countering sophisticated cyber threats. In this project, a Dynamic AI-Augmented Firewall will be developed which uses artificial intelligence augmented firewall for the proactive detection and response to cyber threats thereby undertaking network protection and security better than traditional firewalls. To accomplish the objectives stated above, the study will develop an AI-enabled anomaly detection system that will constant
APA, Harvard, Vancouver, ISO, and other styles
10

Chu, Jie, and Zhao Li. "Design and Implementation of the Firewall Policy Audit Based on Improved Policy Tree." Applied Mechanics and Materials 736 (March 2015): 179–82. http://dx.doi.org/10.4028/www.scientific.net/amm.736.179.

Full text
Abstract:
Firewall plays an important role in today's network security, and its rule configuration is reasonable or not directly related to the security of network environment. With the increasing size of the network, firewall configurations are becoming increasingly complex, and the firewall policy audit should be born in order to better play the protective properties of the firewall. Firstly, this paper studies the relationship between firewall rules in detail, analyzes some common types of rules abnormal of audit programs and reviews existing policies. Next, this paper proposes a improved audit progr
APA, Harvard, Vancouver, ISO, and other styles
11

Park, Jinyong, Byeongjo Park, and Tae-Sung Kim. "Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration." Applied Sciences 15, no. 6 (2025): 2979. https://doi.org/10.3390/app15062979.

Full text
Abstract:
A firewall is a device that is used generally to prevent cyberattacks and protect internal assets by blocking unauthorized access. Information security managers have many difficulties in managing firewall policies due to errors or anomalies in the policy that are caused by frequent internal and external requests. This paper intends to develop an anomaly classification model to detect anomalies and measure the priority of resolution in firewall policy as well as a visualized tool that supports information security managers to manage their firewall policy efficiently. This model and tool help in
APA, Harvard, Vancouver, ISO, and other styles
12

J., Britto Dennis, Chindhya Baby U., and Sashikumar S. "FIREWALL OPTIMIZATION TECHNIQUE USING SMART CONTEXT SENSITIVE METHOD." International Journal of Engineering Research and Modern Education (IJERME) 5, no. 1 (2020): 6–11. https://doi.org/10.5281/zenodo.3634357.

Full text
Abstract:
Firewall is a system that secures a network, shielding it from access by unauthorized users. A firewall is designed using firewall policy; it dictates how the firewall should handle applications traffic such as web, email or telnet, it also explains how the firewall is to be managed and updated. Certain error in firewall policy either creates security holes or blocks legitimate traffic which in turn could lead to irreparable, therefore to design firewall policy is an important issue. A firewall policy is designed by using three phase: a design phase, a comparison phase, and a resolution phase.
APA, Harvard, Vancouver, ISO, and other styles
13

Bodei, Chiara, Lorenzo Ceragioli, Pierpaolo Degano, et al. "FWS: Analyzing, maintaining and transcompiling firewalls." Journal of Computer Security 29, no. 1 (2021): 77–134. http://dx.doi.org/10.3233/jcs-200017.

Full text
Abstract:
Firewalls are essential for managing and protecting computer networks. They permit specifying which packets are allowed to enter a network, and also how these packets are modified by IP address translation and port redirection. Configuring a firewall is notoriously hard, and one of the reasons is that it requires using low level, hard to interpret, configuration languages. Equally difficult are policy maintenance and refactoring, as well as porting a configuration from one firewall system to another. To address these issues we introduce a pipeline that assists system administrators in checking
APA, Harvard, Vancouver, ISO, and other styles
14

Darade, R.V., and P.B. Kumbharkar. "Firewall policy anomaly detection and resolution." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 879–83. https://doi.org/10.5281/zenodo.14742678.

Full text
Abstract:
Security of all private networks in businesses and institutions is achieved by firewall. Firewall provides protection by the quality of policy configured. Lack of Systematic analysis mechanism and Tools, Complex firewall configuration makes designing and managing firewall policies difficult. With help of segmentation rule, anomaly management framework is designed for accurate detection and effective resolution of anomalies. Using this technique, packets of network can be divided into set of disjoint packet space segments. Every segment is associated with unique set of firewall rules which spec
APA, Harvard, Vancouver, ISO, and other styles
15

Bateni, Shirin, and Ali Asghar Khavasi. "DESIGN A SECURITY FIREWALL POLICY TO FILTER INCOMING TRAFFIC IN PACKET SWITCHED NETWORKS USING CLASSIFICATION METHODS." Ciência e Natura 38, no. 2 (2016): 821. http://dx.doi.org/10.5902/2179460x21530.

Full text
Abstract:
Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become complex and error-prone. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. In addition, inserting or modifying a filtering rule requires to overcome and filter a range of special attacks or issues in network. In this paper, we present a machine learning based algorithm that filter Denial of Service (DoS) attacks in networks. This filtering algorithm has been designed by using a classification alg
APA, Harvard, Vancouver, ISO, and other styles
16

Hamed, Hazem, and Ehab Al-Shaer. "On autonomic optimization of firewall policy organization." Journal of High Speed Networks 15, no. 3 (2006): 209–27. https://doi.org/10.3233/hsn-2006-287.

Full text
Abstract:
Security policies play a critical role in many of the current network security technologies such as firewalls, IPSec and IDS devices. The configuration of these policies not only determines the functionality of such devices, but also substantially affects their performance. The optimization of filtering policy configuration is critically important to provide high performance packet filtering particularly for high speed network security. Current packet filtering techniques exploit the characteristics of the filtering policies, but they do not consider the traffic behavior in optimizing their se
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Alex X. "Firewall policy change-impact analysis." ACM Transactions on Internet Technology 11, no. 4 (2012): 1–24. http://dx.doi.org/10.1145/2109211.2109212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Liu, Alex X. "Firewall policy verification and troubleshooting." Computer Networks 53, no. 16 (2009): 2800–2809. http://dx.doi.org/10.1016/j.comnet.2009.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Firmansyah, Firmansyah, and Mochamad Wahyudi. "Analisis Performa Access Control List Menggunakan Metode Firewall Policy Base." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (2021): 283–92. http://dx.doi.org/10.30812/matrik.v20i2.1068.

Full text
Abstract:
Pemanfaatan teknologi informasi mampu mendukung mobilitas yang begitu cepat dan sangat efesien. Kini, hampir semua transfer data dilakukan menggunakan jaringan komputer dan bersifat terbuka. dengan terjadinya transfer data yang bersifat terbuka hal ini mampu memicu terjadinya kejahatan didalam dunia jaringan komputer (cybercrime). Penerapan keamanan jaringan komputer merupakan hal yang sangat vital. untuk memiminalisir cybercrime didalam jaringan komputer, maka diterapkanlah keamanan jaringan menggunakan metode zone-based policy firewall. Zone-based policy firewall mampu melakukan pembatasan a
APA, Harvard, Vancouver, ISO, and other styles
20

Putri, Herika Andini, Rohmat Tulloh, and Nazel Djibran. "Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware." Jurnal Informatika Universitas Pamulang 8, no. 2 (2023): 322–29. http://dx.doi.org/10.32493/informatika.v8i2.33656.

Full text
Abstract:
Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime. This is very dangerous and causes huge losses. In addition, the most commonly found cybercrimes are malware threats, phishing, DDoS, and others. In this study, the implementation of the Paloalto firewall is carried out by configuring the firewall, as is the attack testing stage using malware such as Eicar, ransomware, Trojans, Dos, and web filtering. The results of this test aim to prevent the risk of data loss, material loss, and the paralysis
APA, Harvard, Vancouver, ISO, and other styles
21

Zhang, Tao, Yuan Yuan Ma, Wei Li, Jian Shi, and Na Wang. "An Improved Method of Firewall Policy Anomaly Detection Based on Decision Tree." Applied Mechanics and Materials 672-674 (October 2014): 1925–30. http://dx.doi.org/10.4028/www.scientific.net/amm.672-674.1925.

Full text
Abstract:
Anomalous access control policy on firewall reduces the efficiency of the equipment, thus affecting the overall security of the network. This paper introduces an improved method of firewall policy anomaly detection based on decision tree, by transforming all the firewall access control rules into a decision tree to store the information in a tree data structure, each rule corresponds to the only one path of the tree. The experiment results show that this method solves some shortcomings in the existing decision tree based firewall policy anomaly detection methods, avoids spending time on compar
APA, Harvard, Vancouver, ISO, and other styles
22

Timmerman, Ruben I., Arjen Leerkes, Richard Staring, and Nicola Delvino. "‘Free In, Free Out’: Exploring Dutch Firewall Protections for Irregular Migrant Victims of Crime." European Journal of Migration and Law 22, no. 3 (2020): 427–55. http://dx.doi.org/10.1163/15718166-12340082.

Full text
Abstract:
Abstract Real and perceived risks of deportation may compromise the effective right of irregular migrants to report to the police if they have been a victim of crime. Some localities have therefore introduced so-called ‘firewall protection’, providing a clear separation between the provision of public services and immigration enforcement. This article explores one such policy in the Netherlands: ‘free in, free out’. While the policy began as a local pilot project, in 2015 it was introduced at the national-level alongside implementation of EU Victim’s Rights Directive, and currently represents
APA, Harvard, Vancouver, ISO, and other styles
23

Ali, Muhammad Qasim, Ehab Al-Shaer, and Taghrid Samak. "Firewall Policy Reconnaissance: Techniques and Analysis." IEEE Transactions on Information Forensics and Security 9, no. 2 (2014): 296–308. http://dx.doi.org/10.1109/tifs.2013.2296874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hu, Hongxin, Gail-Joon Ahn, and Ketan Kulkarni. "Detecting and Resolving Firewall Policy Anomalies." IEEE Transactions on Dependable and Secure Computing 9, no. 3 (2012): 318–31. http://dx.doi.org/10.1109/tdsc.2012.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Raziya, Abdul, and Amrutasagar Kavarthapu. "Resolving Cross Domain Firewall Policy Anomalies." International Journal of Computer Applications 124, no. 14 (2015): 12–15. http://dx.doi.org/10.5120/ijca2015905771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Morzhov, Sergey V., and Valeriy A. Sokolov. "An Effective Algorithm for Collision Resolution in Security Policy Rules." Modeling and Analysis of Information Systems 26, no. 1 (2019): 75–89. http://dx.doi.org/10.18255/1818-1015-2019-1-75-89.

Full text
Abstract:
A firewall is the main classic tool for monitoring and managing the network traffic on a local network. Its task is to compare the network traffic passing through it with the established security rules. These rules, which are often also called security policy, can be defined both before and during the operation of the firewall. Managing the security policy of large corporate networks is a complex task. In order to properly implement it, firewall filtering rules must be written and organized neatly and without errors. In addition, the process of changing or inserting new rules should be perform
APA, Harvard, Vancouver, ISO, and other styles
27

Cho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.

Full text
Abstract:
This paper proposes a method to optimize the performance of web application firewalls according to their positions in large scale networks. Since ports for web services are always open and vulnerable in security, the introduction of web application firewalls is essential. Methods to configure web application firewalls in existing networks are largely divided into two types. There is an in-line type where a web application firewall is located between the network and the web server to be protected. This is mostly used in small scale single networks and is vulnerable to the physical obstruction o
APA, Harvard, Vancouver, ISO, and other styles
28

Sudarma Putri, Dewa Ayu Rai, Lilik Widyawati, Husain, and I Made Yadi Dharma. "Analysis of Firewall Policy Effectiveness in Filtering Network Traffic Using Elastic Stack." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 3 (2025): 2129–33. https://doi.org/10.59934/jaiea.v4i3.1116.

Full text
Abstract:
This research is motivated by the increasing importance of network security in the digital age, particularly for organizations like Company X, given the rise in cyber threats that compromise data and system integrity. The study aims to analyze the effectiveness of the firewall policy in filtering network traffic using the Elastic Stack and to provide recommendations for improvement. The research methodology involves processing and analyzing firewall log data over one month using the Elastic Stack. The results demonstrate that the Elastic Stack successfully identified normal and suspicious traf
APA, Harvard, Vancouver, ISO, and other styles
29

Akash, Belkhede *., Sonawane Sanket, Khirsagar Chaitanya, and D. D. Sapkal Prof. "FIREWALL ENGINE BASED ON GRAPHICS PROCESSING UNIT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 424–29. https://doi.org/10.5281/zenodo.47575.

Full text
Abstract:
A firewall is very important object in network security. The Working of firewall policy rules has become time consuming and very much complex. The main issue is the slow filtering action during heavy load of internet traffic. To reduce the time consumption there is a need to Use parallel computing for optimized firewall engine, which runs on GPU's. We mainly focus on the creation of parallel algorithms for firewall system by using parallel computing which reduces the time consumption and concurrently it can allow for strong threat and virus detection of incoming packets by using GPU enable
APA, Harvard, Vancouver, ISO, and other styles
30

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this c
APA, Harvard, Vancouver, ISO, and other styles
31

Arunkumar.k, Arunkumar k. "Auto Finding and Resolving Distributed Firewall Policy." IOSR Journal of Computer Engineering 10, no. 5 (2013): 56–60. http://dx.doi.org/10.9790/0661-1055660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

K, Arunkumar, and Suganthi B. "Auto Finding and Resolving Distributed Firewall Policy." IOSR Journal of Computer Engineering 16, no. 5 (2014): 93–97. http://dx.doi.org/10.9790/0661-16579397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Caldeira, Filipe, and Edmundo Monteiro. "Policy-based networking: applications to firewall management." Annales des Télécommunications 59, no. 1-2 (2004): 38–54. http://dx.doi.org/10.1007/bf03179673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ceragioli, Lorenzo, Pierpaolo Degano, and Letterio Galletta. "Can my firewall system enforce this policy?" Computers & Security 117 (June 2022): 102683. http://dx.doi.org/10.1016/j.cose.2022.102683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

K . Chawan, Abhishek, and Shashikant S . Mahajan. "Solving Firewall Policy Anomalies Using Generic Algorithm." International Journal of Engineering Trends and Technology 20, no. 4 (2015): 200–203. http://dx.doi.org/10.14445/22315381/ijett-v20p238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Taylor, Onate, and Promise Ezekiel. "Firewall Defense and Response Policy towards Resisting Attacks on Network Logs." International Journal of Computing Sciences Research 8 (January 1, 2024): 2886–904. https://doi.org/10.25147/ijcsr.2017.001.1.193.

Full text
Abstract:
Background–In an era marked by escalating cyber threats, safeguarding network infrastructure and preserving the integrity of network logs have become paramount concerns for organizations worldwide.Objective: This paper proposes a robust Firewall Defense and Response Policy leveraging a state-of-the-art Gradient Boost Classifier to achieve exceptional accuracy in detecting cyber threats. Methods–The proposed methodology combines advanced machine learning techniques with an in-depth analysis of network logs. The model was trained on a comprehensive dataset, downloaded from Kaggle.com, comprising
APA, Harvard, Vancouver, ISO, and other styles
37

Lee, Hyunjung, Suryeon Lee, Kyounggon Kim, and Huy Kang Kim. "HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis." IEEE Access 9 (2021): 71737–53. http://dx.doi.org/10.1109/access.2021.3077146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Archana, V., and T. Kumesh. "Anomaly Discovery and Resolution in Distributed Firewall Policy." International Journal of MC Square Scientific Research 6, no. 1 (2014): 43–49. http://dx.doi.org/10.20894/ijmsr.117.006.001.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Vanikalyani, G., P. Avinash P.Avinash, and P. Pandarinath P.Pandarinath. "Cross-Domain Search for Policy Anomalies in Firewall." International Journal of Computer Applications 104, no. 6 (2014): 20–24. http://dx.doi.org/10.5120/18205-9337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Liang, Xiaoyan, Chunhe Xia, Jian Jiao, Junshun Hu, and Xiaojian Li. "Modeling and global conflict analysis of firewall policy." China Communications 11, no. 5 (2014): 124–35. http://dx.doi.org/10.1109/cc.2014.6880468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lin, Zhiming, and Zhiqiang Yao. "Firewall Anomaly Detection Based on Double Decision Tree." Symmetry 14, no. 12 (2022): 2668. http://dx.doi.org/10.3390/sym14122668.

Full text
Abstract:
To solve the problems regarding how to detect anomalous rules with an asymmetric structure, which leads to the firewall not being able to control the packets in and out according to the administrator’s idea, and how to carry out an incremental detection efficiently when the new rules are added, anomaly detection algorithms based on an asymmetric double decision tree were considered. We considered the packet filter, the most common and used type of First Matching Rule, for the practical decision space of each rule and the whole policy. We adopted, based on the asymmetric double decision tree de
APA, Harvard, Vancouver, ISO, and other styles
42

Roup, Abdul. "Integration of Firewall Log Data into Accounting Information Systems to Enhance Internal Control and Cyber Threat Detection: A Case Study Using Palo Alto PA820." Jurnal Ilmiah Akuntansi Kesatuan 11, no. 3 (2023): 663–68. https://doi.org/10.37641/jiakes.v11i3.3673.

Full text
Abstract:
This study aims to evaluate and integrate log data from the Palo Alto PA820 firewall security device into an accounting information system (AIS) to strengthen internal control and enhance early detection of cyber threats. As digital security risks increasingly target accounting data, this integration is expected to provide real-time visibility into network activities that could compromise the confidentiality, integrity, and availability of financial information. A case study approach was conducted in a company that utilizes both the PA820 firewall and a network-based AIS. Data were collected f
APA, Harvard, Vancouver, ISO, and other styles
43

Abedin, Muhammad, Syeda Nessa, Latifur Khan, Ehab Al Shaer, and Mamoun Awad. "Analysis of firewall policy rules using traffic mining techniques." International Journal of Internet Protocol Technology 5, no. 1/2 (2010): 3. http://dx.doi.org/10.1504/ijipt.2010.032611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Duan, Qi, and Ehab Al-Shaer. "Traffic-aware dynamic firewall policy management: techniques and applications." IEEE Communications Magazine 51, no. 7 (2013): 73–79. http://dx.doi.org/10.1109/mcom.2013.6553681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Sangeetha, Dr S. Brilly. "DDoS Deflate and APF (Advanced Policy Firewall):A Report." International Journal of Computer Trends and Technology 27, no. 2 (2015): 64–69. http://dx.doi.org/10.14445/22312803/ijctt-v27p111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hunt, Ray. "Internet/Intranet firewall security—policy, architecture and transaction services." Computer Communications 21, no. 13 (1998): 1107–23. http://dx.doi.org/10.1016/s0140-3664(98)00173-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chen, Fei, Alex X. Liu, Jeehyun Hwang, and Tao Xie. "First step towards automatic correction of firewall policy faults." ACM Transactions on Autonomous and Adaptive Systems 7, no. 2 (2012): 1–24. http://dx.doi.org/10.1145/2240166.2240177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

R, Sherine Jenny, and Sugirtham N. "SDN-Based Security for Smart Devices Against Denial of Service Attacks." Indian Journal of Science and Technology 16, no. 3 (2023): 181–89. https://doi.org/10.17485/IJST/v16i3.1960.

Full text
Abstract:
ABSTRACT <strong>Objectives:</strong>&nbsp;To achieve a reliable IoT environment by mitigating the DoS attack.&nbsp;<strong>Methods:</strong>&nbsp;The study focuses on building a firewall on an Open Flow-based Software Defined Networking (SDN) controller to secure a network. We chose the POX controller, which is based on the Python programming language, from among various controllers. Furthermore, a detailed analysis of denial of service attacks against IoT devices has been carried out using Wireshark.&nbsp;<strong>Findings:</strong>&nbsp;SDN design allows networks to actively monitor traffic
APA, Harvard, Vancouver, ISO, and other styles
49

Kim, Gwang-Hyeok, Yun-Ju Gwon, Dong-Su Kim, and Tae-Myeong Jeong. "The Policy Distribution Algorithm of Firewall in Integrated Security Management." KIPS Transactions:PartC 9C, no. 4 (2002): 467–72. http://dx.doi.org/10.3745/kipstc.2002.9c.4.467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jufri, Muhammad, and Heryanto Heryanto. "PENINGKATAN KEAMANAN JARINGAN WIRELESS DENGAN MENERAPKAN SECURITY POLICY PADA FIREWALL." JOISIE (Journal Of Information Systems And Informatics Engineering) 5, no. 2 (2021): 98–108. http://dx.doi.org/10.35145/joisie.v5i2.1759.

Full text
Abstract:
Perkembangan teknologi saat ini memiliki dampak signifikan terhadap kinerja manusia dalam memenuhi aktivitas sehari-hari. Perkembangan teknologi membuat kejahatan dalam jaringan semakin meluas sehingga keamanan jaringan sangat berpengaruh terhadap pencegahan serangan yang dilakukan oleh penyerang. Contoh kejahatan seperti pencurian data perusahaan yang menyebabkan kerugian bagi perusahaan serta kejahatan lainnya. Untuk itu, diperlukan sistem yang dapat mendeteksi serangan Seperti Denial of Service, Ping Attack, dan Port Scanning yaitu Intrusion Detection System (IDS) berfungsi memantau setiap
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!