Academic literature on the topic 'Firewalls'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewalls.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Firewalls"

1

Hanane Aznaoui and Canan Batur Şahin. "A Virtual Data Center Comparison Of Different Firewalls' Performance." Journal of Advancement in Computing 1, no. 1 (2023): 1–8. http://dx.doi.org/10.36755/jac.v1i1.46.

Full text
Abstract:
Whether virtual or real, every data centre depends on its network, and the firewall is a crucial component of that network for secure communication. Different types of firewalls, such as software firewalls, physical firewalls, virtual appliance firewalls, and kernel-integrated firewalls, can secure data centre connections. When choosing a firewall, there are many things to take into account, especially in a virtualized data centre where each firewall behaves differently depending on the situation. Reduced costs, effective administration extensibility, greater resource usage, scalability, and e
APA, Harvard, Vancouver, ISO, and other styles
2

Umm e Khadija and Iqra Saqib. "Comparison Of Different Firewalls Performance In A Virtual For Cloud Data Center." Journal of Advancement in Computing 1, no. 1 (2023): 21–28. http://dx.doi.org/10.36755/jac.v1i1.49.

Full text
Abstract:
Every data centre, whether virtual or physical, relies on its network, and the firewall is an essential part of that network for safe communication. Data centre connection can be protected by a variety of firewall types, including software firewalls, physical firewalls, virtual appliance firewalls, and kernel-integrated firewalls. There are several factors to consider when selecting a firewall, especially in a virtualized data centre, where each firewall works differently in different situations. Virtualized data centres are intended to yield lower budgets, efficient management extensibility,
APA, Harvard, Vancouver, ISO, and other styles
3

Hakani, Dhwani, and Palvinder Singh Mann. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 141. https://doi.org/10.11591/ijict.v14i1.pp141-152.

Full text
Abstract:
<p>Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall’s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called “TreeRule Firewall,” which has benefits and functions effectively in large-scale networks
APA, Harvard, Vancouver, ISO, and other styles
4

Sablok, Aman, and Rohini S. Hallikar. "SDN Integration with Firewalls and Enhancing Security Monitoring on Firewalls." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26202.

Full text
Abstract:
Software-defined Networking (SDN) has revolutionized the way networks are managed and operated by decoupling the control plane from the data plane. This separation allows for centralized control and programmability, offering greater flexibility, scalability, and agility in network management.Firewalls, renowned for their robust security features, play a critical role in protecting network traffic. Integrating SDN principles and technologies with Firewalls presents an opportunity to enhance their management, scalability, and orchestration capabilities. This paper explores the integration of SDN
APA, Harvard, Vancouver, ISO, and other styles
5

Khummanee, Suchart, Panida Songram, and Potchara Pruksasri. "FFF: Fast Firewall Framework to Enhance Rule Verifying over High-speed Networks." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (2022): 35–47. http://dx.doi.org/10.37936/ecti-cit.2022161.246990.

Full text
Abstract:
The current traffic trend on computer networks is growing exponentially, affecting network firewalls because they constantly have to filter out massive amounts of data. In this paper, we implement a firewall framework to improve traffic processing speed, named the Fast Firewall Framework (FFF). FFF can verify rules at Big-O(1) worst-case access time, and it also consumes a small amount of memory, which is only Big-O(nbit). To evaluate the firewalls' effectiveness, we benchmark the proposed firewall framework against the two fastest firewalls (The state of the art of opensource firewall), IPSet
APA, Harvard, Vancouver, ISO, and other styles
6

Alicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (2021): 283. http://dx.doi.org/10.3390/fi13110283.

Full text
Abstract:
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, fire
APA, Harvard, Vancouver, ISO, and other styles
7

Thume, Vamshi Krishna. "Dominance Of Hardware Firewalls And Denial Of Firewall Attacks (Case Study BlackNurse Attack)." Dominance Of Hardware Firewalls And Denial Of Firewall Attacks (Case Study BlackNurse Attack) 11, no. 4 (2022): 28–33. https://doi.org/10.5281/zenodo.6586032.

Full text
Abstract:
Network security is the most important aspect which concerns with protection of the data of an organization and firewalls play a crucial role in this. The main goal of this paper is to show that hardware firewalls perform better when compared to software-based firewalls. The performance of a firewall is the deciding factor when it comes to data breaches and data theft. Firewalls are the devices that stay upfront and act as a gatekeeper for internal networks but these firewalls are prone to DDoS attacks nowadays and giving awareness about working principles and how these DDoS attacks works is n
APA, Harvard, Vancouver, ISO, and other styles
8

Manisha, Patil, and Mohurle Savita. "The Empirical Study of the Evolution of the Next Generation Firewalls." International Journal of Trend in Scientific Research and Development 1, no. 5 (2017): 193–96. https://doi.org/10.31142/ijtsrd2259.

Full text
Abstract:
Even after the adoption of network security policies and practices, unauthorized intrusion occurs. It is an attack in which attacker gets access to the system by means of different hacking and cracking techniques. Firewall is hardware software based network security system that uses rules to control incoming and outgoing network packet. A firewall controls access to the resources of a network through a positive control model. There are various traditional firewalls like Packet Filters, Application level Gateways and Circuit level Gateways which has certain pros and cons. To overcome disadvanta
APA, Harvard, Vancouver, ISO, and other styles
9

Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.

Full text
Abstract:
Attempts at unauthorized intrusion occur quite often, even after the adoption of the necessary security policies and practices for the information network. These are attacks in which an attacker gains access to the system using various hacking techniques. A firewall is a hardware and software-based network security system that uses certain rules to manage incoming and outgoing network packets. The firewall controls access to network resources through a positive management model. There are various traditional firewalls, such as packet filters, program-level gateways, and chip-level gateways, wh
APA, Harvard, Vancouver, ISO, and other styles
10

Nikhil, Bhagat. "Implementing Stateful vs. Stateless Firewalls: Choosing the Right Approach for Modern Network Security." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 10, no. 5 (2022): 1–8. https://doi.org/10.5281/zenodo.14005344.

Full text
Abstract:
Rapid growth of threats to network security through ever-evolving cyber technology has given rise to the need for stronger, more flexible security systems in today’s IT infrastructure. Firewalls are the core part of network security as they are responsible for protecting systems from unauthorized access, virus, malware, and other types of attacks. These firewalls are divided into stateless and stateful, which both offer different operating models and features. Stateless firewalls scan packets on pre-defined rules without keeping record of the connection state between the packets, making
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Firewalls"

1

Verwoerd, Theuns Willem. "Stateful distributed firewalls." Thesis, University of Canterbury. Computer Science and Software Engineering, 2001. http://hdl.handle.net/10092/9620.

Full text
Abstract:
A fundamental feature in current network security architectures is the monolithic firewall. This thesis presents an alternative design, consisting of a cluster of small firewall nodes, that offers better economy, scalability, failure recovery and potentially, greatly increased processing power. These improvements allow the use of computationally expensive firewalling and IDS techniques to offer effective protection against all types of network attack. Also presented are techniques for developing fault-tolerant proxy applications, maintaining connections in spite of node failures, and a novel l
APA, Harvard, Vancouver, ISO, and other styles
2

Bonnevier, Jani, and Sebastian Heimlén. "The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067.

Full text
Abstract:
Firewalls help protect computer networks from intrusions and malware by enforcing restrictions on what network traffic is allowed to pass through the firewall into the network. This thesis explores the role of firewalls in network security, with the ultimate goal of advancing attempts to create a threat model for firewalls. Five areas are explored, namely: Definitions of Concepts Firewalls vs. Services as Targets for Direct Attack The Past and Future of Firewalls Approach to Estimating Firewall Security Firewall Configuration and Security Policies These areas are explored using a questionnair
APA, Harvard, Vancouver, ISO, and other styles
3

Schreiber, Alexander. "Firewalls - Brandmauer oder Feuermelder ?" Universitätsbibliothek Chemnitz, 1999. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199900516.

Full text
Abstract:
Firewalls - oft als scheinbar magisches Wundermittel für den Schutz von Firmennetzen vor dem Schrecken der allgegenwärtigen Hacker angepriesen - sind nur ein Teil einer Sicherheitsarchitektur. Wie funktionieren sie, was tun sie? Was vermögen sie wirklich zu leisten, was nicht? Ist die Installation eines Firewalls ausreichend oder muß noch mehr getan werden um wirklich sicher zu sein und sich nicht nur sicher zu fühlen? Sind sie nur lästig (Sicherheit versus Bequemlichkeit) oder notwendig?
APA, Harvard, Vancouver, ISO, and other styles
4

Hearn, Kay, and n/a. "Sniffer Packets & Firewalls." University of Canberra. n/a, 2008. http://erl.canberra.edu.au./public/adt-AUC20081217.153550.

Full text
Abstract:
Falun Gong protesters, the bombing of the Chinese Embassy in Belgrade, the spy plane incident and a series of mine accidents are just some of the events over the past decade that involved the Internet. In each incident the leadership of the Chinese Communist Party (CCP) was caught off guard by the circumvention of informational flows as a consequence of the Internet. This is in some ways indicative of the impact the medium is having on the ability of the CCP to manage political discourse within the confines of the country. This thesis examines the way that political discourse in contemporary C
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Vu. "Class firewalls in Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ48439.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nguyen, Vu Carleton University Dissertation Computer Science. "Class firewalls in Java." Ottawa, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prasetijo, Agung Budi. "Application-level proxy firewalls." Thesis, Queensland University of Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Höfler, Torsten, Christian Burkert, and Martin Telzer. "Comparative Firewall Study." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harris, B. A. "Firewalls and virtual private networks." Thesis, University of Canterbury. Computer Science, 1998. http://hdl.handle.net/10092/8413.

Full text
Abstract:
The Internet has become a global computing phenomenon, and during the 1990's has had more influence on the computer - communications industry than any other development in its history. There are two major issues effecting the development of the Internet for the 21st century; performance and security. This thesis is concerned with the later; in particular the issues raised by the interconnection of TCP/IP based networks between trusted and untrusted network domains. Four main topics are addressed: the common threats and vulnerabilities that effect the TCP/IP protocol suite at the Network, Tran
APA, Harvard, Vancouver, ISO, and other styles
10

Rangarajan, Vinod K. (Vinod Kashyap) 1975. "End-to-end connectivity across firewalls." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47623.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.<br>Includes bibliographical references (leaves 53-54).<br>by Vinod K. Rangarajan.<br>S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Firewalls"

1

Ziegler, Robert L. Linux Firewalls. New Riders, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nisbet, Ewan. Adaptive firewalls. Oxford Brookes University, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pagan, Kevin. Intranet firewalls. Ventana, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

B, Constantine Carl, ed. Linux firewalls. 2nd ed. New Riders, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Strebe, Matthew. Firewalls 24 seven. 2nd ed. Sybex, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Faheem. Stateful inspection firewalls. University of East London, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

D, Zwicky Elizabeth, ed. Building Internet Firewalls. O'Reilly & Associates, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Strebe, Matthew. Firewalls 24 seven. Sybex, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chapman, D. Brent. Building Internet firewalls. O'Reilly & Associates, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vacca, John R. Firewalls clearly explained. 2nd ed. Morgan Kaufmann, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Firewalls"

1

Kizza, Joseph Migga. "Firewalls." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Perez, André. "Firewalls." In Network Security. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kizza, Joseph Migga. "Firewalls." In Texts in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph Migga. "Firewalls." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kizza, Joseph Migga. "Firewalls." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

O’Leary, Mike. "Firewalls." In Cyber Operations. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rao, Umesh Hodeghatta, and Umesha Nayak. "Firewalls." In The InfoSec Handbook. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vazquez, Antonio. "Firewalls." In Learn CentOS Linux Network Services. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2379-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Shaer, Ehab. "Firewalls." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

O’Leary, Mike. "Firewalls." In Cyber Operations. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4294-0_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Firewalls"

1

Senthilkumar, Lohith, and Aaditya Rengarajan. "FLARE: Federated Learning And Resilient Encryption for Firewalls." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pavlović, Milan, Marija Zajeganović, and Milan Milivojević. "Implementation of Next-Generation Firewalls in Modern Networks." In 7th International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2023. http://dx.doi.org/10.31410/itema.2023.19.

Full text
Abstract:
The primary function of any firewall is to assist in protecting against unwanted or malicious traffic entering or leaving a network. How­ever, as threats evolve and become increasingly challenging to detect, net­work security must remain equally sophisticated. In addition to access control, Next-Generation Firewalls can block modern threats such as advanced mal­ware and application-layer attacks. This paper will present the fundamen­tal characteristics of Next-Generation Firewalls and their implementation in modern networks, particularly their use in IoT. First, the concept of Next-Gen­eration
APA, Harvard, Vancouver, ISO, and other styles
3

Acharya, H. B., Aditya Joshi, and M. G. Gouda. "Firewall modules and modular firewalls." In 2010 18th IEEE International Conference on Network Protocols (ICNP). IEEE, 2010. http://dx.doi.org/10.1109/icnp.2010.5762766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fiorenza, Maurício, Diego Kreutz, and Rodrigo Mansilha. "Gerenciamento de Firewalls em Redes Híbridas." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19260.

Full text
Abstract:
O gerenciamento de firewalls é um processo desafiador em redes híbridas, pois envolve aplicar políticas de segurança em soluções tradicionais (e.g., Cisco NGFW, IPTables) e emergentes (e.g., OpenFlow, P4, e POF). Neste trabalho é proposta e discutida uma arquitetura, organizada em uma pilha de camadas, para gerência integrada de firewalls em redes híbridas. Como prova de conceito, foi implementado um protótipo que gera a configuração de regras para diferentes soluções de firewall. O protótipo foi avaliado experimentalmente através de testes de continuidade de tráfego (bloqueio e liberação) e l
APA, Harvard, Vancouver, ISO, and other styles
5

Ilić, Predrag, Radomir Stamatović, Gordan Konečni, and Ivan Gojković. "ENHANCING SCADA SYSTEM SECURITY THROUGH THE IMPLEMENTATION OF PAIRED INTERNAL AND EXTERNAL FIREWALLS." In 21.Simpozijum CIGRE Srbija 2024. Srpski nacionalni komitet Međunarodnog saveta za velike električne mreže CIGRE Srbija, 2024. https://doi.org/10.46793/cigre21s.307i.

Full text
Abstract:
The security of SCADA (Supervisory Control and Data Acquisition) systems is critical due to their key role in managing and controlling industrial processes. This paper explores the security aspects of SCADA systems, with a particular focus on the implementation of paired internal and external firewalls as a primary protective measure. SCADA systems are often exposed to various types of threats, including malware, unauthorized access, and targeted attacks, which can lead to serious consequences for production processes and infrastructure. Internal firewalls serve as the first line of defense wi
APA, Harvard, Vancouver, ISO, and other styles
6

Costa Júnior, Edmilson P. da, Silas T. Medeiros, Carlos Eduardo da Silva, and Marcos Madruga. "An Architecture for Self-adaptive Distributed Firewall." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19318.

Full text
Abstract:
The notion of secure perimeter given by border firewalls ignores the possibility of attacks originating from inside the network. Although distributed firewalls allow the protection of individual hosts, the provided services might still be susceptible to attacks, as firewalls usually do not analyze application protocols. In this way, software vulnerabilities may be exploited until the problem has been fixed. From vulnerability discovery to the application of patches there is an exposure window that should be reduced. In this context, this paper presents an architecture for a distributed firewal
APA, Harvard, Vancouver, ISO, and other styles
7

Fiorenza, Maurício, Diego Kreutz, and Rodrigo B. Mansilha. "FWunify: uma Ferramenta para Simplificar a Configuração de Múltiplos Firewalls." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg_estendido.2021.17337.

Full text
Abstract:
A configuração de múltiplos firewalls é um processo desafiador. As soluções existentes são especializadas e requerem o domínio prévio ou aprendizado de uma variedade de sintaxes e métodos de configuração para implementar corretamente as políticas de segurança desejadas. Para reduzir a curva de aprendizagem e mitigar erros operacionais, propomos a ferramenta FWunify – uma solução para configuração integrada e automática de firewalls. Através de uma arquitetura composta por múltiplas camadas e módulos fracamente acoplados, a FWunify permite que novas soluções de firewall sejam incorporadas a fer
APA, Harvard, Vancouver, ISO, and other styles
8

Fiorenza, Maurício, Diego Kreutz, and Rodrigo B. Mansilha. "FWunify: uma Ferramenta para Simplificar a Configuração de Múltiplos Firewalls." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg_estendido.2021.17337.

Full text
Abstract:
A configuração de múltiplos firewalls é um processo desafiador. As soluções existentes são especializadas e requerem o domínio prévio ou aprendizado de uma variedade de sintaxes e métodos de configuração para implementar corretamente as políticas de segurança desejadas. Para reduzir a curva de aprendizagem e mitigar erros operacionais, propomos a ferramenta FWunify – uma solução para configuração integrada e automática de firewalls. Através de uma arquitetura composta por múltiplas camadas e módulos fracamente acoplados, a FWunify permite que novas soluções de firewall sejam incorporadas a fer
APA, Harvard, Vancouver, ISO, and other styles
9

Lohmann, Samir, Luciano Paschoal Gaspary, and Cristina Melchiors. "Avaliação do Emprego de Raciocínio baseado em Casos para Identificar Cenários de Intrusão em Logs de Firewalls." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2005. http://dx.doi.org/10.5753/sbseg.2005.21538.

Full text
Abstract:
A análise de conteúdo de logs gerados por firewalls mostra-se fundamental para reconhecer seqüências de eventos suspeitas que indiquem estratégias utilizadas por intrusos para tentar obter acesso não autorizado a estações e serviços. Tal análise, em função do grande volume de informações armazenadas, é inviável de ser realizada de forma manual.Este artigo apresenta uma abordagem que explora a técnica de raciocínio baseado em casos, da Inteligência Artificial, para identificar, de forma automática, cenários de intrusão em logs de firewalls. O artigo descreve a avaliação da abordagem, realizada
APA, Harvard, Vancouver, ISO, and other styles
10

Vieira, Emanuel de Franceschi Vieira, Emerson Wendler, Tiago Antonio Rizzetti, and Renato Preigschadt De Azevedo. "Estudo Comparativo de Firewalls de Código Aberto Baseados em FreeBSD: pfSense vs. OPNsense." In Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2024. https://doi.org/10.5753/errc.2024.4557.

Full text
Abstract:
Este artigo apresenta uma análise comparativa preliminar entre dois firewalls de código aberto baseados em FreeBSD: pfSense e OPNsense. Ambas as ferramentas são amplamente utilizadas para controle de tráfego e segurança de redes, mas apresentam diferenças significativas em termos de desempenho, consumo de recursos e usabilidade. O estudo foi conduzido em um ambiente real com aproximadamente 500 dispositivos conectados, com foco inicial no consumo de processamento e memória de cada firewall. Resultados preliminares indicam diferenças significativas entre as soluções em relação ao uso de recurso
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Firewalls"

1

Wack, John, Ken Cutler, and Jamie Pole. Guidelines on firewalls and firewall policy :. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scarfone, K. A., and P. Hoffman. Guidelines on firewalls and firewall policy. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-41r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fithen, William, Julia Allen, and Ed Stoner. Deploying Firewalls. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada367717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Finlayson, R. IP Multicast and Firewalls. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thaler, D. Reflections on Host Firewalls. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Orvis, W. High-end Home Firewalls CIAC-2326. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/15013800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Le, F., S. Faccin, B. Patil, and H. Tschofenig. Mobile IPv6 and Firewalls: Problem Statement. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chung, Yeji. Fighting North Korean fire with firewalls. East Asia Forum, 2024. http://dx.doi.org/10.59425/eabc.1721988000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Freed, N. Behavior of and Requirements for Internet Firewalls. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Newman, Richard E., Vipan R. Nalla, and Ira S. Moskowitz. Covert Channels and Simple Timed Mix-Firewalls. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada426203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!