To see the other types of publications on this topic, follow the link: Firewalls.

Journal articles on the topic 'Firewalls'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Firewalls.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hanane Aznaoui and Canan Batur Şahin. "A Virtual Data Center Comparison Of Different Firewalls' Performance." Journal of Advancement in Computing 1, no. 1 (2023): 1–8. http://dx.doi.org/10.36755/jac.v1i1.46.

Full text
Abstract:
Whether virtual or real, every data centre depends on its network, and the firewall is a crucial component of that network for secure communication. Different types of firewalls, such as software firewalls, physical firewalls, virtual appliance firewalls, and kernel-integrated firewalls, can secure data centre connections. When choosing a firewall, there are many things to take into account, especially in a virtualized data centre where each firewall behaves differently depending on the situation. Reduced costs, effective administration extensibility, greater resource usage, scalability, and e
APA, Harvard, Vancouver, ISO, and other styles
2

Umm e Khadija and Iqra Saqib. "Comparison Of Different Firewalls Performance In A Virtual For Cloud Data Center." Journal of Advancement in Computing 1, no. 1 (2023): 21–28. http://dx.doi.org/10.36755/jac.v1i1.49.

Full text
Abstract:
Every data centre, whether virtual or physical, relies on its network, and the firewall is an essential part of that network for safe communication. Data centre connection can be protected by a variety of firewall types, including software firewalls, physical firewalls, virtual appliance firewalls, and kernel-integrated firewalls. There are several factors to consider when selecting a firewall, especially in a virtualized data centre, where each firewall works differently in different situations. Virtualized data centres are intended to yield lower budgets, efficient management extensibility,
APA, Harvard, Vancouver, ISO, and other styles
3

Hakani, Dhwani, and Palvinder Singh Mann. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 141. https://doi.org/10.11591/ijict.v14i1.pp141-152.

Full text
Abstract:
<p>Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall’s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called “TreeRule Firewall,” which has benefits and functions effectively in large-scale networks
APA, Harvard, Vancouver, ISO, and other styles
4

Sablok, Aman, and Rohini S. Hallikar. "SDN Integration with Firewalls and Enhancing Security Monitoring on Firewalls." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26202.

Full text
Abstract:
Software-defined Networking (SDN) has revolutionized the way networks are managed and operated by decoupling the control plane from the data plane. This separation allows for centralized control and programmability, offering greater flexibility, scalability, and agility in network management.Firewalls, renowned for their robust security features, play a critical role in protecting network traffic. Integrating SDN principles and technologies with Firewalls presents an opportunity to enhance their management, scalability, and orchestration capabilities. This paper explores the integration of SDN
APA, Harvard, Vancouver, ISO, and other styles
5

Khummanee, Suchart, Panida Songram, and Potchara Pruksasri. "FFF: Fast Firewall Framework to Enhance Rule Verifying over High-speed Networks." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (2022): 35–47. http://dx.doi.org/10.37936/ecti-cit.2022161.246990.

Full text
Abstract:
The current traffic trend on computer networks is growing exponentially, affecting network firewalls because they constantly have to filter out massive amounts of data. In this paper, we implement a firewall framework to improve traffic processing speed, named the Fast Firewall Framework (FFF). FFF can verify rules at Big-O(1) worst-case access time, and it also consumes a small amount of memory, which is only Big-O(nbit). To evaluate the firewalls' effectiveness, we benchmark the proposed firewall framework against the two fastest firewalls (The state of the art of opensource firewall), IPSet
APA, Harvard, Vancouver, ISO, and other styles
6

Alicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (2021): 283. http://dx.doi.org/10.3390/fi13110283.

Full text
Abstract:
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, fire
APA, Harvard, Vancouver, ISO, and other styles
7

Thume, Vamshi Krishna. "Dominance Of Hardware Firewalls And Denial Of Firewall Attacks (Case Study BlackNurse Attack)." Dominance Of Hardware Firewalls And Denial Of Firewall Attacks (Case Study BlackNurse Attack) 11, no. 4 (2022): 28–33. https://doi.org/10.5281/zenodo.6586032.

Full text
Abstract:
Network security is the most important aspect which concerns with protection of the data of an organization and firewalls play a crucial role in this. The main goal of this paper is to show that hardware firewalls perform better when compared to software-based firewalls. The performance of a firewall is the deciding factor when it comes to data breaches and data theft. Firewalls are the devices that stay upfront and act as a gatekeeper for internal networks but these firewalls are prone to DDoS attacks nowadays and giving awareness about working principles and how these DDoS attacks works is n
APA, Harvard, Vancouver, ISO, and other styles
8

Manisha, Patil, and Mohurle Savita. "The Empirical Study of the Evolution of the Next Generation Firewalls." International Journal of Trend in Scientific Research and Development 1, no. 5 (2017): 193–96. https://doi.org/10.31142/ijtsrd2259.

Full text
Abstract:
Even after the adoption of network security policies and practices, unauthorized intrusion occurs. It is an attack in which attacker gets access to the system by means of different hacking and cracking techniques. Firewall is hardware software based network security system that uses rules to control incoming and outgoing network packet. A firewall controls access to the resources of a network through a positive control model. There are various traditional firewalls like Packet Filters, Application level Gateways and Circuit level Gateways which has certain pros and cons. To overcome disadvanta
APA, Harvard, Vancouver, ISO, and other styles
9

Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.

Full text
Abstract:
Attempts at unauthorized intrusion occur quite often, even after the adoption of the necessary security policies and practices for the information network. These are attacks in which an attacker gains access to the system using various hacking techniques. A firewall is a hardware and software-based network security system that uses certain rules to manage incoming and outgoing network packets. The firewall controls access to network resources through a positive management model. There are various traditional firewalls, such as packet filters, program-level gateways, and chip-level gateways, wh
APA, Harvard, Vancouver, ISO, and other styles
10

Nikhil, Bhagat. "Implementing Stateful vs. Stateless Firewalls: Choosing the Right Approach for Modern Network Security." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 10, no. 5 (2022): 1–8. https://doi.org/10.5281/zenodo.14005344.

Full text
Abstract:
Rapid growth of threats to network security through ever-evolving cyber technology has given rise to the need for stronger, more flexible security systems in today’s IT infrastructure. Firewalls are the core part of network security as they are responsible for protecting systems from unauthorized access, virus, malware, and other types of attacks. These firewalls are divided into stateless and stateful, which both offer different operating models and features. Stateless firewalls scan packets on pre-defined rules without keeping record of the connection state between the packets, making
APA, Harvard, Vancouver, ISO, and other styles
11

Chen, Pisin, Yen Chin Ong, Don Nelson Page, Misao Sasaki, and Dong-Han Yeom. "Unclothed firewalls." International Journal of Modern Physics D 25, no. 13 (2016): 1645003. http://dx.doi.org/10.1142/s0218271816450036.

Full text
Abstract:
We have previously argued that fluctuations of the Hawking emission rate can cause a black hole event horizon to fluctuate inside the location of a putative firewall, rendering the firewall naked. This assumes that the firewall is located near where the horizon would be expected based on the past evolution of the spacetime. Here, we expand our previous results by defining two new estimates for where the firewall might be that have more smooth temporal behavior than our original estimate. Our results continue to contradict the usual assumption that the firewall should not be observable except b
APA, Harvard, Vancouver, ISO, and other styles
12

Mansoor, Farooq, Khan Rafi, and Hassan Khan Mubashir. "Stout Implementation of Firewall and Network Segmentation for Securing IoT Devices." Indian Journal of Science and Technology 16, no. 33 (2023): 2609–21. https://doi.org/10.17485/IJST/v16i33.1262.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;To develop algorithms for different types of firewalls and their implementation for securing IoT devices. Assess the effectiveness of the developed algorithms and highlights the importance of a comprehensive approach to securing IoT devices, including maintaining strong authentication and encryption, secure communication protocols, and keeping devices updated with the latest security measures.&nbsp;<strong>Methods:</strong>&nbsp;The present study focuses on creating algorithms that can be used to secure IoT devices through various types of firewalls,
APA, Harvard, Vancouver, ISO, and other styles
13

Seyidova, I., and D. Karatova. "FIREWALLS: SECURITY AND THREAT RESEARCH." Sciences of Europe, no. 107 (December 24, 2022): 137–39. https://doi.org/10.5281/zenodo.7479808.

Full text
Abstract:
Web security has become a noteworthy issue in the current state of affairs. And it looks like an evil that, if left to spread, will have repercussions for all of us in a matter of seconds. Thus, this article analyzes web security with a firewall in mind and how it can help protect the system and the Internet. A firewall is a part of a computer or network system configured to prevent communications from unauthorized sources and allow access from authorized sources. Additionally, methods and types of firewalls are discussed. The remainder of the paper looks at the firewall and how it can help wi
APA, Harvard, Vancouver, ISO, and other styles
14

Singh, Sachin. "To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set." International Journal of Advance Research and Innovation 2, no. 4 (2014): 17–26. http://dx.doi.org/10.51976/ijari.241404.

Full text
Abstract:
Firewall is a most crucial element to implement security policies in a network and also crucial to success of network rather say to success of an organization. Despite of its important in any network it has many problems and one of them is increasing number of rules in firewall’s rule set. Since in today’s environment, enterprises looking to provide strongest security to their users and also want to secure their data at maximum level and hence they have increased rules in firewall’s rule set. However increasing number of rules in firewall rule set is not an efficient way to provide maximum sec
APA, Harvard, Vancouver, ISO, and other styles
15

Khummanee, Suchart, Umaporn Saisangchan, Kritsanapong Somsuk, and Sarutte Atsawaraungsuk. "High-speed Firewall Rule Verification Technique Improves Throughput Performance for IP Version 6." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 3 (2022): 338–51. http://dx.doi.org/10.37936/ecti-cit.2022163.248690.

Full text
Abstract:
Throughput performance of firewalls depend on the execution speed to verify rules. Internet Protocol Version 6 (IPv6) and IPv4 ruleset memory requirements differ and affect rule access and execution time in a wide range of common firewalls. This paper contributes a high-speed firewall to execute rules for IPv6 with constant O(1) access time, and consumes optimal O(nbit) memory for 64-bit architectures, named FW6 firewall. Results are based on actual performance evaluations in conjunction with other high-speed firewalls (IPSets, IPack, and F3), such as processing time, memory consumption and th
APA, Harvard, Vancouver, ISO, and other styles
16

Dr. Parvathi S, Raj shekhar Singh, Simpal Kumari, and Sudhanshu Kumar. "Dynamic AI-Augmented Firewall for Real-Time Threat Mitigation." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 353–57. https://doi.org/10.47392/irjaeh.2025.0049.

Full text
Abstract:
Firewalls are an integral part of network protection against intrusions, their traditional approaches of sticking to static rules have rendered firewalls ineffective when countering sophisticated cyber threats. In this project, a Dynamic AI-Augmented Firewall will be developed which uses artificial intelligence augmented firewall for the proactive detection and response to cyber threats thereby undertaking network protection and security better than traditional firewalls. To accomplish the objectives stated above, the study will develop an AI-enabled anomaly detection system that will constant
APA, Harvard, Vancouver, ISO, and other styles
17

Dhwani, Hakani, and Singh Mann Palvinder. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 141–52. https://doi.org/10.11591/ijict.v14i1.pp141-152.

Full text
Abstract:
Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall&rsquo;s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called &ldquo;TreeRule Firewall,&rdquo; which has benefits and functions effectively in large-scale
APA, Harvard, Vancouver, ISO, and other styles
18

Anwar, Raja Waseem, Tariq Abdullah, and Flavio Pastore. "Firewall Best Practices for Securing Smart Healthcare Environment: A Review." Applied Sciences 11, no. 19 (2021): 9183. http://dx.doi.org/10.3390/app11199183.

Full text
Abstract:
Smart healthcare environments are growing at a rapid pace due to the services and benefits offered to healthcare practitioners and to patients. At the same time, smart healthcare environments are becoming increasingly complex environments where a plethora of devices are linked with each other, to deliver services to patients, and they require special security measures to protect the privacy and integrity of user data. Moreover, these environments are exposed to various kinds of security risks, threats, and attacks. Firewalls are considered as the first line of defense for securing smart health
APA, Harvard, Vancouver, ISO, and other styles
19

Cho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.

Full text
Abstract:
This paper proposes a method to optimize the performance of web application firewalls according to their positions in large scale networks. Since ports for web services are always open and vulnerable in security, the introduction of web application firewalls is essential. Methods to configure web application firewalls in existing networks are largely divided into two types. There is an in-line type where a web application firewall is located between the network and the web server to be protected. This is mostly used in small scale single networks and is vulnerable to the physical obstruction o
APA, Harvard, Vancouver, ISO, and other styles
20

Fakiha, Bandr. "Effectiveness of Forensic Firewall in Protection of Devices from Cyberattacks." International Journal of Safety and Security Engineering 12, no. 1 (2022): 77–82. http://dx.doi.org/10.18280/ijsse.120110.

Full text
Abstract:
Computers and networks serve a host of functions. As they provide the much-needed services, unscrupulous parties also make work difficult by promoting cyberattacks that could lead to sensitive data loss and inability to access a personal computer. The submission explores the use of firewalls in protecting users against network-driven attacks. Firewalls intercept malware attacks, phishing, and identity theft by denying access to certain suspicious sites. However, users must realize that some hardware firewalls cannot protect them from certain web attacks and software firewalls that are in-built
APA, Harvard, Vancouver, ISO, and other styles
21

Lindqvist, Janne, Essi Vehmersalo, Miika Komu, and Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." International Journal of Handheld Computing Research 1, no. 1 (2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.

Full text
Abstract:
Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile cli
APA, Harvard, Vancouver, ISO, and other styles
22

Satrya, Gandeva Bayu, Faiizal Eko Nugroho, and Tri Brotoharsono. "Improving Network Security - A Comparison of Open Source DPI Software." International Journal on Information and Communication Technology (IJoICT) 2, no. 2 (2017): 11. http://dx.doi.org/10.21108/ijoict.2016.22.77.

Full text
Abstract:
&lt;p&gt;The classification of data traffic in a firewall using parameters such as port number, IP address, and MAC address is not sufficient. For example, currently, many applications can be used without a port number meaning they can easily circumvent a firewall. Firewalls inspecting up to only layer four could allow malicious data to pass. Next-generation deep packet inspection (DPI) is a method that can be used for firewalls as a method of classification up to layer seven in data traffic control.&lt;/p&gt;&lt;p&gt;This research recommends the use of nDPI and L7-filter by network administra
APA, Harvard, Vancouver, ISO, and other styles
23

Qian, Xinyang. "Network security and computer program." Applied and Computational Engineering 5, no. 1 (2023): 744–49. http://dx.doi.org/10.54254/2755-2721/5/20230688.

Full text
Abstract:
In this era of rapid development of network and computer technology, the potential dangers become more and more numerous. There are many security issues that are hidden and unobtrusive. Creating a computer firewall to defend against network security leaks is a necessity. Firewalls can be personal and make a match that is more in line with what is in mind. Firewalls must allow any necessary connections from application business and technical expertise through the firewall to ensure the integrity of the data network. For firewall pairings, Border network, Perimeter Network, and Internal Network
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Xing, and Tao Zhao. "Design and Research of Firewall System of Communication Department Based on Network Information Technology." Journal of Physics: Conference Series 2074, no. 1 (2021): 012044. http://dx.doi.org/10.1088/1742-6596/2074/1/012044.

Full text
Abstract:
Abstract In the past, the structure of traditional firewalls was similar to that of checkpoints, and the design structure was relatively simple. At the same time, it is also convenient for subsequent maintenance. As an isolation technology, it can be accessed by people with consistent identity information. But for some relatively high-level data information, using traditional firewalls, foreign intruders can easily obtain relevant information. This article chooses to use the working mechanism of network information technology, and then analyzes the hardware structure of the firewall based on t
APA, Harvard, Vancouver, ISO, and other styles
25

Mohammed, Raya Kahtan, and Yoichiro UENO. "An FPGA-based Network Firewall with Expandable Rule Description." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 3 (2018): 1310. http://dx.doi.org/10.11591/ijeecs.v10.i3.pp1310-1318.

Full text
Abstract:
&lt;p&gt;With the rapid growth of communications via the Internet, the need for an effective firewall system which has not badly affect the overall network performances has been increased. In this paper, a Field Programmable Gate Array (FPGA) -based firewall system with high performance has been implemented using Network FPGA (NetFPGA) with Xilinx Kintex-7 XC7K325T FPGA. Based on NetFPGA reference router project, a NetFPGA-based firewall system was implemented. The hardware module performs rule matching operation using content addressable memory (CAM) for higher speed data processing. To evalu
APA, Harvard, Vancouver, ISO, and other styles
26

Raya., K. Mohammed, and UENO Yoichiro. "An FPGA-based Network Firewall with Expandable Rule Description." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 3 (2018): 1310–18. https://doi.org/10.11591/ijeecs.v10.i3.pp1310-1318.

Full text
Abstract:
With the rapid growth of communications via the Internet, the need for an effective firewall system which has not badly affect the overall network performances has been increased. In this paper, a Field Programmable Gate Array (FPGA) -based firewall system with high performance has been implemented using Network FPGA (NetFPGA) with Xilinx Kintex-7 XC7K325T FPGA. Based on NetFPGA reference router project, a NetFPGA-based firewall system was implemented. The hardware module performs rule matching operation using content addressable memory (CAM) for higher speed data processing. To evaluate syste
APA, Harvard, Vancouver, ISO, and other styles
27

Hakani, Dhwani, and Palvinder Singh Mann. "Enhanced Particle Swarm Optimization-Based Approach to Firewall Optimal Rule Reordering." International Journal of Computer Theory and Engineering 16, no. 4 (2024): 134–44. http://dx.doi.org/10.7763/ijcte.2024.v16.1361.

Full text
Abstract:
Firewalls are required to ensure that only trustworthy packets are sent back and forth across the network in order to provide secure network communication. Firewalls employ the rules that network administrators establish to control which packets are allowed access to an organization’s private network in order to enforce security regulations. By classifying packets, network devices can determine how incoming packets behave. A greater communication delay is caused by a higher rule count since it is achieved by a linear search on a list of categorisation rules. The goal of Optimal Rule Ordering (
APA, Harvard, Vancouver, ISO, and other styles
28

Schultz, E. Eugene. "When firewalls fail: Lessons learned from firewall testing." Network Security 1997, no. 2 (1997): 8–11. http://dx.doi.org/10.1016/s1353-4858(97)86649-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Periyasamy, A. R. Pon. "Security Issues of Firewall." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.

Full text
Abstract:
The need of Network Security is accelerating at the same pace as that of increased Internet usage. Network Security prevents from illegitimate admittance, hacking andauthentic data transportation. Network Security consist of provisions and policies adopted by a network administrator to preclude and monitor unauthorized access, alterations, perversion, declination of a computer network and network-accessible resources. Network Security is achieved by Firewall. Firewall is a hardware or software device which is designed to permit or refuse network transmissions based upon certain protocols. Fire
APA, Harvard, Vancouver, ISO, and other styles
30

Khummanee, Suchart, Phatthanaphong Chomphuwiset, and Potchara Pruksasri. "DSSF: Decision Support System to Detect and Solve Firewall Rule Anomalies based on a Probability Approach." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (2022): 56–73. http://dx.doi.org/10.37936/ecti-cit.2022161.246996.

Full text
Abstract:
Currently, establishing a private network on the Internet is highly hazardous for attacks as attackers continuously scan computers for vulnerabilities within the connected network. The firewall ranked the highest as a network device is selected to protect unauthorized accesses and attacks. However, firewalls can effectively protect against assaults based on adequately defined rules without any anomalies. In order to resolve anomaly problems and assist firewall admins with the ability to manage the rules effectively, in this paper, a prototype of the decision support system has been designed an
APA, Harvard, Vancouver, ISO, and other styles
31

Singleton, Douglas. "Non-Abelian firewall." International Journal of Modern Physics D 29, no. 14 (2020): 2043003. http://dx.doi.org/10.1142/s0218271820430038.

Full text
Abstract:
A simple, closed-form solution to the Yang-Mills field equations is presented which has a non-Abelian firewall — a spherical “horizon” where the energy density diverges. By the gravity/gauge duality, this non-Abelian firewall implies the existence of a gravitational firewall. Gravitational firewalls have been proposed as a way of resolving the information loss paradox, but at the cost of violating the equivalence principle.
APA, Harvard, Vancouver, ISO, and other styles
32

Sadykov, A. M., R. R. Yamaletdinov, and D. I. Sabirova. "Russian firewall screening tools for secured systems." Herald of Dagestan State Technical University. Technical Sciences 51, no. 4 (2025): 154–63. https://doi.org/10.21822/2073-6185-2024-51-4-154-163.

Full text
Abstract:
Objective. The purpose of the work is to make the comparative analysis of the firewall tools for secure systems on the Russian market. The sharp increase in demand for products from domestic developers is associated with the need to abandon the use of foreign information security tools and transition to Russian analogues. Method. Systematization, description and analysis are used as research methods. In this work functional analysis will be carried out in relation to the following solutions: «Universal security gateway «UserGate», security complex «Continent 4», hardware and software complex «
APA, Harvard, Vancouver, ISO, and other styles
33

Dr., A.SHAJI GEORGE, and GEORGE A.S.HOVAN. "A Brief Study on The Evolution of Next Generation Firewall and Web Application Firewall." IJARCCE:International Journal of Advanced Research in Computer and Communication Engineering 10, no. 5 (2021): 31–37. https://doi.org/10.5281/zenodo.7027397.

Full text
Abstract:
The rapid development of Information Technology (IT) has altered the appearance of the network perimeter. Data is all around, with users who access it from around the world and from all types of devices. At the same moment, Information Technology (IT) teams are implementing analytics, cloud, as well as automation to quicken the delivery of innovative applications and drive business development. These essential changes have created a threat environment that reveals weaknesses in legacy security technologies, for example, the port-based network security, as well as the different tools and techno
APA, Harvard, Vancouver, ISO, and other styles
34

Ozhiganova, Marina, and Emil Kurtametov. "Using Neural Networks to Protect Web Applications." NBI Technologies, no. 2 (December 2020): 16–20. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.3.

Full text
Abstract:
Security of network systems has become a necessity, as more and more important information is stored and used online. The spread of web applications opens up new attack vectors. Traditional security mechanisms, such as firewalls, are not designed to protect web applications and therefore do not provide adequate protection. Current attacks cannot be prevented only by blocking ports 80 (HTTP) and 443 (HTTPS). Preventative measures (such as web application firewall rules) are not always possible. Signature methods for detection are always behind the actual event. Protocol-enforced network firewal
APA, Harvard, Vancouver, ISO, and other styles
35

Cho, Hye Rim, Jeong Hwa Yoo, and Jung Kwan Seo. "Fire Resistance Characteristics of Firewall Structure Associated with Impact Damage Induced by Explosion." Journal of Ocean Engineering and Technology 37, no. 3 (2023): 99–110. http://dx.doi.org/10.26748/ksoe.2023.002.

Full text
Abstract:
When a fire accident accompanied by an explosion occurs, the surrounding firewalls are affected by impact and thermal loads. Damaged firewalls due to accidental loads may not fully perform their essential function. Therefore, this paper proposes an advanced methodology for evaluating the fire resistance performance of firewalls damaged by explosions. The fragments were assumed to be scattered, and fire occurred as a vehicle exploded in a large compartment of a roll-on/roll-off (RO-RO) vessel. The impact velocity of the fragments was calculated based on the TNT equivalent mass corresponding to
APA, Harvard, Vancouver, ISO, and other styles
36

Telkar, Prajwal S., and Dr Kiran V. "Implementation of Threat policies and Routing process in Firepower Threat Defense." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 833–39. http://dx.doi.org/10.51201/jusst/21/05344.

Full text
Abstract:
A firewall is a guard of the network which inspects the packets based on the rules adopted to be executed in the threat environment. This is used to block the flow of undesirable content, forbids unauthorized remote access, and impedes immoral contents, assures security based on protocol and IP address, insulates seamless activity in Enterprise networks, shields conversation and coordination contents and thus this cybersecurity tool secures the system when administering on the internet with humongous amount of malicious data threatening the performance and data of the network structure. Cisco’
APA, Harvard, Vancouver, ISO, and other styles
37

Scott, Ralph L. "Wired to the World: Firewalls." North Carolina Libraries 61, no. 3 (2009): 109. http://dx.doi.org/10.3776/ncl.v61i3.168.

Full text
Abstract:
An antivirus program continuously monitors your computer to detect a virus, which is automatically deleted and/or quarantined. Firewall programs, on the other hand, block access to your computer from the Internet and prevent hackers from planting a worm or other type of malicious software in your computer. Firewalls protect your data, your computer, and your name from corruption. Stories are legion about the Internet being used to seize control of a computer identity to do things such as send out fake e-mails in your name canceling final exams, insulting your boss, and ordering merchandise suc
APA, Harvard, Vancouver, ISO, and other styles
38

Botvinko, Anatoly Y., and Konstantin E. Samouylov. "Evaluation of the firewall influence on the session initiation by the SIP multimedia protocol." Discrete and Continuous Models and Applied Computational Science 29, no. 3 (2021): 221–29. http://dx.doi.org/10.22363/2658-4670-2021-29-3-221-229.

Full text
Abstract:
Firewalls is one of the major components to provide network security. By using firewalls, you can solve such problems as preventing unauthorized access, and deleting, modifying and/or distributing information under protection. The process of information flows filtration by a firewall introduces additional time delays, thus possibly leading to disruption of stable operation of the protected automated system or to inaccessibility of the services provided by the system. Multimedia services are particularly sensitive to service time delays. The main purpose of the work presented in this paper is t
APA, Harvard, Vancouver, ISO, and other styles
39

Sichkar, Mykhailo, and Larysa Pavlova. "A short survey of the capabilities of Next Generation firewalls." Computer Science and Cybersecurity, no. 1 (December 25, 2023): 28–33. http://dx.doi.org/10.26565/2519-2310-2023-1-02.

Full text
Abstract:
This article examines the history, types, capabilities, and advantages of next-generation firewall (NGFW) technology. Firewalls are an important tool for protecting network resources from various information security threats. With the development of technology and the changing nature of attacks, especially those involving artificial intelligence, firewalls have also evolved, acquiring new functions and capabilities. This work provides a short survey of the main types, capabilities and benefits of next-generation firewall (NGFW) technology, which is a modern solution for comprehensive network p
APA, Harvard, Vancouver, ISO, and other styles
40

Sobol, Michael I. "Firewalls." Information Systems Security 6, no. 1 (1997): 20–28. http://dx.doi.org/10.1080/10658989709342525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Cheswick, William. "Firewalls." Scientific American 279, no. 4 (1998): 106–7. http://dx.doi.org/10.1038/scientificamerican1098-106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Meyer, Helen. "Firewalls." Computers & Security 15, no. 3 (1996): 225–26. http://dx.doi.org/10.1016/s0167-4048(96)90312-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Manaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.

Full text
Abstract:
The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research
APA, Harvard, Vancouver, ISO, and other styles
44

Gamilla, Anazel P., and Marlon A. Naagas. "Header of death: security implications of IPv6 extension headers to the open-source firewall." Bulletin of Electrical Engineering and Informatics 11, no. 1 (2022): 319–26. http://dx.doi.org/10.11591/eei.v11i1.3446.

Full text
Abstract:
IPv6 extension headers (EHs) contain additional information utilized by network devices (such as routers and firewalls) to determine how to direct or process an IPv6 packet. However, the use of excessive and unknown EHs can lead to the security implications such as evasion and denial of service (DoS) of the target firewall. Study revealed that there is no permanent remediation that prevents the IPv6 EHs attack from invading the open-source firewalls by default. Using IPv6 packet manipulations technique, the attacker can evade the target network including the firewall and target host that can l
APA, Harvard, Vancouver, ISO, and other styles
45

Anazel, P. Gamilla, and A. Naagas Marlon. "Header of death: security implications of IPv6 extension headers to the open-source firewall." Bulletin of Electrical Engineering and Informatics 11, no. 1 (2022): 319–26. https://doi.org/10.11591/eei.v11i1.3446.

Full text
Abstract:
IPv6 extension headers (EHs) contain additional information utilized by network devices (such as routers and firewalls) to determine how to direct or process an IPv6 packet. However, the use of excessive and unknown EHs can lead to the security implications such as evasion and denial of service (DoS) of the target firewall. Study revealed that there is no permanent remediation that prevents the IPv6 EHs attack from invading the opensource firewalls by default. Using IPv6 packet manipulations technique, the attacker can evade the target network including the firewall and target host that can le
APA, Harvard, Vancouver, ISO, and other styles
46

Tsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (2018): 318. http://dx.doi.org/10.3926/jiem.2534.

Full text
Abstract:
Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several netw
APA, Harvard, Vancouver, ISO, and other styles
47

Crépeau, François, and Bethany Hastie. "The Case for ‘Firewall’ Protections for Irregular Migrants." European Journal of Migration and Law 17, no. 2-3 (2015): 157–83. http://dx.doi.org/10.1163/15718166-12342076.

Full text
Abstract:
The issue of irregular migration is experiencing heightened attention in political, social and legal arenas. While deterrence and crime-control discourse and practices dominate current approaches to irregular migration, this article seeks to focus on the problematic neglect of the treatment of irregular migrants in destination countries, in relation to their ability to access fundamental rights and basic public services. This article will put forth an argument for the establishment of firewalls – a separation between immigration enforcement activities and public service provision. This article
APA, Harvard, Vancouver, ISO, and other styles
48

Altamezvi, Alnuman Mohammed Abubaker, Abdulwahed Omran E. Alalwani, and Ashour Alsllami. "Comparing Context Based Access Control to Zone-based Policy Firewalls." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 1215–22. http://dx.doi.org/10.22214/ijraset.2022.44006.

Full text
Abstract:
Abstract: This paper will be introducing a comparative study on the choices between two best classical software firewalls one is Context Based Access Control (CBAC) and Zone Based firewall (ZBF). Both of them may deliver a stateful inspection of TCP, UDP and/or ICMP control packets. Through this study, two type of networks were designed one used the CBAC firewall and the other works with a zone based firewall. The result obtained showed that ZBF has several feature which are not available in CBAC. Furthermore, ZBF deals with the security zones the traffic will be dynamically inspected as it pa
APA, Harvard, Vancouver, ISO, and other styles
49

Das, Sumit Kumar, and Payal Panda. "Implementation of Generative AI in Enhancing Cyber Threat Intelligence and Next Generation Firewalls." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 1169–89. https://doi.org/10.22214/ijraset.2025.66536.

Full text
Abstract:
Abstract: Cybersecurity is a critical concern in the digital age, demanding advanced and innovative approaches to safeguard sensitive information and systems. This research conducts a strong examination of next-generation firewalls (NGFWs) that can be integrated with artificial intelligence (AI). As traditional firewalls fall short in addressing modern cyber threats, the incorporation of AI provides a promising avenue for enhanced threat detection and mitigation. Leveraging machine learning and deep learning approaches, the study assesses key performance metrics such as detection accuracy, fal
APA, Harvard, Vancouver, ISO, and other styles
50

Yasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer, and Nadia Tabassum. "Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 3 (2020): 54–70. http://dx.doi.org/10.54692/lgurjcsit.2020.0403100.

Full text
Abstract:
Rapid increase in internet users also brought new ways of privacy and security exploitation. Intrusion is one of such attacks in which an authorized user can access system resources and is major concern for cyber security community. Although AV and firewall companies work hard to cope with this kind of attacks and generate signatures for such exploits but still, they are lagging behind badly in this race. This research proposes an approach to ease the task of rules generationby making use of machine learning for this purpose. We used 17 network features to train a random forest classifier and
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!