Academic literature on the topic 'Firewall Model'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewall Model.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Firewall Model"

1

Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.

Full text
Abstract:
Attempts at unauthorized intrusion occur quite often, even after the adoption of the necessary security policies and practices for the information network. These are attacks in which an attacker gains access to the system using various hacking techniques. A firewall is a hardware and software-based network security system that uses certain rules to manage incoming and outgoing network packets. The firewall controls access to network resources through a positive management model. There are various traditional firewalls, such as packet filters, program-level gateways, and chip-level gateways, which have their pros and cons. To overcome the shortcomings of the traditional firewall, a new generation of firewalls is introduced. The article presents the study of traditional firewalls and their evolution to a new generation firewall and its benefits. New firewalls still belong to the third generation, but are often referred to as the "next generation" or NGFW. This type combines all previously used approaches with an in-depth review of filtered content and its comparison with a database to identify potentially dangerous traffic. Modern firewalls often have built-in additional security systems: virtual private networks (VPNs), intrusion prevention and detection systems (IPS / IDS), authentication management, application management, and web filtering. Their state-of-the-art technology can filter outbound traffic. This helps reduce the likelihood of data theft by attackers. In addition, an important function of the firewall is to reduce the risk of devices becoming part of a botnet (a malicious network with a large group of devices controlled by cybercriminals).
APA, Harvard, Vancouver, ISO, and other styles
2

Khummanee, Suchart, Phatthanaphong Chomphuwiset, and Potchara Pruksasri. "DSSF: Decision Support System to Detect and Solve Firewall Rule Anomalies based on a Probability Approach." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (March 5, 2022): 56–73. http://dx.doi.org/10.37936/ecti-cit.2022161.246996.

Full text
Abstract:
Currently, establishing a private network on the Internet is highly hazardous for attacks as attackers continuously scan computers for vulnerabilities within the connected network. The firewall ranked the highest as a network device is selected to protect unauthorized accesses and attacks. However, firewalls can effectively protect against assaults based on adequately defined rules without any anomalies. In order to resolve anomaly problems and assist firewall admins with the ability to manage the rules effectively, in this paper, a prototype of the decision support system has been designed and developed for encouraging admins to optimize firewall rules and minimize deficiencies that occur in rules by using the probability approach. The experimental results clearly show that the developed model encourages experts and administrators of firewalls to make significant decisions to resolve rule anomalies by expert's confidence increases by 14.8 %, and administrators' confidence soars similarly about 44.2 %. Lastly, the accuracy of correcting rule anomalies is 83 %.
APA, Harvard, Vancouver, ISO, and other styles
3

Xuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang, and Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.

Full text
Abstract:
While mobile networks provide many opportunities for people, they face security problems huge enough that a firewall is essential. The firewall in mobile networks offers a secure intranet through which all traffic is handled and processed. Furthermore, due to the limited resources in mobile networks, the firewall execution can impact the quality of communication between the intranet and the Internet. In this paper, a performance evaluation mathematical model for firewall system of mobile networks is developed using queuing theory for a multihierarchy firewall with multiple concurrent services. In addition, the throughput and the package loss rate are employed as performance evaluation indicators, and discrete-event simulated experiments are conducted for further verification. Lastly, experimental results are compared to theoretically obtained values to identify a resource allocation scheme that provides optimal firewall performance and can offer a better quality of service (QoS) in mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Kailanya, Eunice, Mary Mwadulo, and Amos Omamo. "Dynamic deep stateful firewall packet analysis model." African Journal of Science, Technology and Social Sciences 1, no. 2 (December 23, 2022): 116–23. http://dx.doi.org/10.58506/ajstss.v1i2.20.

Full text
Abstract:
Due to challenges of COVID -19 pandemic, network is widely used and more networkthreats are evolving, therefore, there is a need to improve network tools in order tocontrol threats. Stateful firewall is a network tool that build up packet filters by keepingrecord of packet passing through the network in a state table, so that when a newpacket arrives, the stateful firewall filtering mechanism first checks to determine whetherthe information is similar to the one in state table, in order to allow or blocked a packet.Although several stateful firewall models have been developed to filter network packets,there is no model that is able to filter the entire parts of a network packet which includethe header, trailer and payloads. In the stateful firewall models developed, mixedresearch methodology have been used. The models are developed in pythonprogramming language; an experimental research design is used, string matching andpattern matching algorithms are used in developing the models.
APA, Harvard, Vancouver, ISO, and other styles
5

Frantzen, Mike, Florian Kerschbaum, E. Eugene Schultz, and Sonia Fahmy. "A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals." Computers & Security 20, no. 3 (May 2001): 263–70. http://dx.doi.org/10.1016/s0167-4048(01)00314-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer, and Nadia Tabassum. "Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 3 (September 30, 2020): 54–70. http://dx.doi.org/10.54692/lgurjcsit.2020.0403100.

Full text
Abstract:
Rapid increase in internet users also brought new ways of privacy and security exploitation. Intrusion is one of such attacks in which an authorized user can access system resources and is major concern for cyber security community. Although AV and firewall companies work hard to cope with this kind of attacks and generate signatures for such exploits but still, they are lagging behind badly in this race. This research proposes an approach to ease the task of rules generationby making use of machine learning for this purpose. We used 17 network features to train a random forest classifier and this trained classifier is then translated into rules which can easily be integrated with most commonly used firewalls like snort and suricata etc. This work targets five kind of attacks: brute force, denial of service, HTTP DoS, infiltrate from inside and SSH brute force. Separate rules are generated for each kind of attack. As not every generated rule contributes toward detection that's why an evaluation mechanism is also used which selects the best rule on the basis of precision and f-measure values. Generated rules for some attacks have 100% precision with detection rate of more than 99% which represents effectiveness of this approach on traditional firewalls. As our proposed system translates trained classifier model into set of rules for firewalls so it is not only effective for rules generation but also give machine learning characteristics to traditional firewall to some extent.
APA, Harvard, Vancouver, ISO, and other styles
7

Jasi, Teba Ali, and Muna M. Taher Jawhar. "Detecting network attacks Model based on a long short-term memory LSTM." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 8 (August 27, 2022): 64–72. http://dx.doi.org/10.47577/technium.v4i8.7225.

Full text
Abstract:
Nowadays, network-connected devices such as mobile phones and IoT devices are increasing, the types and numbers of these devices are increasing, the impact of successful attacks is increasing and the fear is growing due to the security effects when using them. In addition, a broader attack surface is available to identify and respond to these network attacks, different systems are used to prevent and stop Some of these systems consist of two layers, the first layer which provides Security and Intrusion Prevention is the firewall, while the second layer is the network intrusion detection system or attack detection system, if only the first layer represented by the firewall is used we cannot prevent attack, that's why attack detection or malware detection systems are used along with a firewall.
APA, Harvard, Vancouver, ISO, and other styles
8

Nguyen Kim, Tuan, Tam Nguyen Tri, Lam Tran Nguyen, and Duy Thai Truong. "Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption)." International journal of Computer Networks & Communications 14, no. 1 (January 31, 2022): 59–69. http://dx.doi.org/10.5121/ijcnc.2022.14104.

Full text
Abstract:
There are many security models for computer networks using a combination of Intrusion Detection System and Firewall proposed and deployed in practice. In this paper, we propose and implement a new model of the association between Intrusion Detection System and Firewall operations, which allows Intrusion Detection System to automatically update the firewall filtering rule table whenever it detects a weirdo intrusion. This helps protect the network from attacks from the Internet.
APA, Harvard, Vancouver, ISO, and other styles
9

Kaur, Gurvinder, Dr S. N. Panda, and Dr Dalvinder Singh Dhaliwal. "Model-Based Tool-Assistance for Packet-Filter Design and its Future." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (April 16, 2014): 4053–57. http://dx.doi.org/10.24297/ijct.v13i1.2929.

Full text
Abstract:
Firewall is a device that secure the private network from unauthorized access. Model based  tool assistance  facilitate the design task and has contribute to the correctness of the filters. But the model based tool assistance approach is design time only does not manage actions at run time. So we shall propose model on run time auditing architecture to detect the attack while packet filtering in firewall technology. It is usually based on the log-files of the packet-filters.
APA, Harvard, Vancouver, ISO, and other styles
10

Pozo, S., R. Ceballos, and R. M. Gasca. "Model-Based Development of firewall rule sets: Diagnosing model inconsistencies." Information and Software Technology 51, no. 5 (May 2009): 894–915. http://dx.doi.org/10.1016/j.infsof.2008.05.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Firewall Model"

1

Robinson, Brian P. "A FIREWALL MODEL FOR TESTING USER-CONFIGURABLE SOFTWARE SYSTEMS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=case1206466905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmad, Salem Mohammed Ali Mohammed. "DoSTDM: A denial of service detection model using firewall data traffic pattern matching." Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1683.

Full text
Abstract:
This research deals with Denial of Service (DoS) flooding attacks. These types of attacks toward internet connected networks are on the rise. The research proposes a model that triangulate between statistical and neural network forecasting approaches. The proposed model can identify DoS attacks using the firewall rejected traffic falling outside the normal levels that could indicate a DoS attack. The triangulation approach provided the research model with multi prediction techniques with high accuracy.
APA, Harvard, Vancouver, ISO, and other styles
3

Januš, Filip. "Pokročilá evaluace úrovně privátnosti v sociálních sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417203.

Full text
Abstract:
Nowadays persists a trend of moving interpersonal communication into the online environment. By the reason of the social networks and social network's services. Many users doesn't perceive threats connected with presence in internet environment. This thesis is focused on the analysis of the user's account privacy settings followed by the evaluation of these settings. The goal is to develop and create a tool providing ability to evaluate privacy settings of the user's account, eventually recommend more suitable settings given to user privacy. To achieve these goals is necessary to use a suitable model performing privacy evaluation. The output of the thesis will consist of a proposal and implementation of tool performing analysis, evaluation and recommendation of how to improve the social network's privacy settings. Which should help users reduce the amount of privacy information leakage.
APA, Harvard, Vancouver, ISO, and other styles
4

Nelson, Timothy. "Margrave: An Improved Analyzer for Access-Control and Configuration Policies." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-theses/203.

Full text
Abstract:
As our society grows more dependent on digital systems, policies that regulate access to electronic resources are becoming more common. However, such policies are notoriously difficult to configure properly, even for trained professionals. An incorrectly written access-control policy can result in inconvenience, financial damage, or even physical danger. The difficulty is more pronounced when multiple types of policy interact with each other, such as in routers on a network. This thesis presents a policy-analysis tool called Margrave. Given a query about a set of policies, Margrave returns a complete collection of scenarios that satisfy the query. Since the query language allows multiple policies to be compared, Margrave can be used to obtain an exhaustive list of the consequences of a seemingly innocent policy change. This feature gives policy authors the benefits of formal analysis without requiring that they state any formal properties about their policies. Our query language is equivalent to order-sorted first-order logic (OSL). Therefore our scenario-finding approach is, in general, only complete up to a user-provided bound on scenario size. To mitigate this limitation, we identify a class of OSL that we call Order-Sorted Effectively Propositional Logic (OS-EPL). We give a linear-time algorithm for testing membership in OS-EPL. Sentences in this class have the Finite Model Property, and thus Margrave's results on such queries are complete without user intervention.
APA, Harvard, Vancouver, ISO, and other styles
5

Nelson, Tim. "First-Order Models for Configuration Analysis." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-dissertations/452.

Full text
Abstract:
Our world teems with networked devices. Their configuration exerts an ever-expanding influence on our daily lives. Yet correctly configuring systems, networks, and access-control policies is notoriously difficult, even for trained professionals. Automated static analysis techniques provide a way to both verify a configuration's correctness and explore its implications. One such approach is scenario-finding: showing concrete scenarios that illustrate potential (mis-)behavior. Scenarios even have a benefit to users without technical expertise, as concrete examples can both trigger and improve users' intuition about their system. This thesis describes a concerted research effort toward improving scenario-finding tools for configuration analysis. We developed Margrave, a scenario-finding tool with special features designed for security policies and configurations. Margrave is not tied to any one specific policy language; rather, it provides an intermediate input language as expressive as first-order logic. This flexibility allows Margrave to reason about many different types of policy. We show Margrave in action on Cisco IOS, a common language for configuring firewalls, demonstrating that scenario-finding with Margrave is useful for debugging and validating real-world configurations. This thesis also presents a theorem showing that, for a restricted subclass of first-order logic, if a sentence is satisfiable then there must exist a satisfying scenario no larger than a computable bound. For such sentences scenario-finding is complete: one can be certain that no scenarios are missed by the analysis, provided that one checks up to the computed bound. We demonstrate that many common configurations fall into this subclass and give algorithmic tests for both sentence membership and counting. We have implemented both in Margrave. Aluminum is a tool that eliminates superfluous information in scenarios and allows users' goals to guide which scenarios are displayed. We quantitatively show that our methods of scenario-reduction and exploration are effective and quite efficient in practice. Our work on Aluminum is making its way into other scenario-finding tools. Finally, we describe FlowLog, a language for network programming that we created with analysis in mind. We show that FlowLog can express many common network programs, yet demonstrate that automated analysis and bug-finding for FlowLog are both feasible as well as complete.
APA, Harvard, Vancouver, ISO, and other styles
6

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Full text
Abstract:

In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.

However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security

within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.

By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.

An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.

APA, Harvard, Vancouver, ISO, and other styles
7

Uznanski, Przemyslaw. "Large scale platform : Instantiable models and algorithmic design of communication schemes." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2013. http://tel.archives-ouvertes.fr/tel-00878837.

Full text
Abstract:
The increasing popularity of Internet bandwidth-intensive applications prompts us to consider followingproblem: How to compute efficient collective communication schemes on large-scale platform?The issue of designing a collective communication in the context of a large scale distributed networkis a difficult and a multi-level problem. A lot of solutions have been extensively studied andproposed. But a new, comprehensive and systematic approach is required, that combines networkmodels and algorithmic design of solutions.In this work we advocate the use of models that are able to capture real-life network behavior,but also are simple enough that a mathematical analysis of their properties and the design of optimalalgorithms is achievable.First, we consider the problem of the measuring available bandwidth for a given point-topointconnection. We discuss how to obtain reliable datasets of bandwidth measurements usingPlanetLab platform, and we provide our own datasets together with the distributed software usedto obtain it. While those datasets are not a part of our model per se, they are necessary whenevaluating the performance of various network algorithms. Such datasets are common for latencyrelatedproblems, but very rare when dealing with bandwidth-related ones.Then, we advocate for a model that tries to accurately capture the capabilities of a network,named LastMile model. This model assumes that essentially the congestion happens at the edgesconnecting machines to the wide Internet. It has a natural consequence in a bandwidth predictionalgorithm based on this model. Using datasets described earlier, we prove that this algorithm is ableto predict with an accuracy comparable to best known network prediction algorithm (DistributedMatrix Factorization) available bandwidth between two given nodes. While we were unable toimprove upon DMF algorithm in the field of point-to-point prediction, we show that our algorithmhas a clear advantage coming from its simplicity, i.e. it naturally extends to the network predictionsunder congestion scenario (multiple connections sharing a bandwidth over a single link). We areactually able to show, using PlanetLab datasets, that LastMile prediction is better in such scenarios.In the third chapter, we propose new algorithms for solving the large scale broadcast problem.We assume that the network is modeled by the LastMile model. We show that under thisassumption, we are able to provide algorithms with provable, strong approximation ratios. Takingadvantage of the simplicity and elasticity of the model, we can even extend it, so that it captures theidea of connectivity artifacts, in our case firewalls preventing some nodes to communicate directlybetween each other. In the extended case we are also able to provide approximation algorithmswith provable performance.The chapters 1 to 3 form three successful steps of our program to develop from scratch amathematical network communication model, prove it experimentally, and show that it can beapplied to develop algorithms solving hard problems related to design of communication schemesin networks.In the chapter 4 we show how under different network cost models, using some simplifyingassumptions on the structure of network and queries, one can design very efficient communicationschemes using simple combinatorial techniques. This work is complementary to the previous chapter in the sense that previously when designing communication schemes, we assumed atomicityof connections, i.e. that we have no control over routing of simple connections. In chapter 4 weshow how to solve the problem of an efficient routing of network request, given that we know thetopology of the network. It shows the importance of instantiating the parameters and the structureof the network in the context of designing efficient communication schemes.
APA, Harvard, Vancouver, ISO, and other styles
8

Hsu, Chia-Jung, and 許家榮. "A knowledge-intensive model for inspecting the conflicts of firewall rules." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/45965352949013417563.

Full text
Abstract:
碩士
中原大學
資訊管理研究所
101
Abstract In this paper, proposed to use Ontology and the semantic language tool for querying the conflicts and reasoning the anomalies among firewall rules, besides the knowledge modeling of firewall policy rules. Internet firewall has been recognized as one of the most effective way to deploy computer network security. Through controlling of network resources and traffic in using the network security policy, the firewall provides a different level of trust between the network demarcation points. In practice firewall configuration, usually to perform thousands of access control rules across multiple networks, this complexity may increase the possibility of configuration errors. However, if the network administrator does not have sufficient skills and expertise to configure them correctly, could lead to unauthorized access with threats to network resources or blocking the authorized access to network resources. Therefore, the correct and consistent rules for the firewall are essential. This proposed method, assists the network administrators to verify the accuracy and consistency at the design of new firewall rules and properly integrate those new rules into the existing rules prior to production deployment, to achieve the requirement of a high security firewall.
APA, Harvard, Vancouver, ISO, and other styles
9

Tung, Chung-Hua, and 董重華. "A study on CNS15408-based Security Evaluation Model for Information Equipment - The Case of Firewall." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/52641628592720510632.

Full text
Abstract:
碩士
中國文化大學
資訊管理學系
100
Nowadays, there are a lot of IT system and equipment products in the world. Each of their developer or vendor declare that their own prod-uct is the highest safety or most complete. But for the general users, they can’t accept those products just by the vendor's rhetoric. They need some fair, independent and trusted standard to assist the judgement. And the Common Criteria for Information Technology Security Evaluation is a quite worthy of the evaluation criteria of the reference of IT products security.
APA, Harvard, Vancouver, ISO, and other styles
10

Felix, Reyes Alejandro. "Test case generation using symbolic grammars and quasirandom sequences." Master's thesis, 2010. http://hdl.handle.net/10048/1668.

Full text
Abstract:
This work presents a new test case generation methodology, which has a high degree of automation (cost reduction); while providing increased power in terms of defect detection (benefits increase). Our solution is a variation of model-based testing, which takes advantage of symbolic grammars (a context-free grammar where terminals are replaced by regular expressions that represent their solution space) and quasi-random sequences to generate test cases. Previous test case generation techniques are enhanced with adaptive random testing to maximize input space coverage; and selective and directed sentence generation techniques to optimize sentence generation. Our solution was tested by generating 200 firewall policies containing up to 20 000 rules from a generic firewall grammar. Our results show how our system generates test cases with superior coverage of the input space, increasing the probability of defect detection while reducing considerably the needed number the test cases compared with other previously used approaches.
Software Engineering and Intelligent Systems
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Firewall Model"

1

Brisighella, Dario. From the firewall forward. Colorado Springs, Colo., U.S.A: Vip Aero Publishers, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Forouzan, Behrouz A. Data Communications Networking (McGraw-Hill Forouzan Networking). 4th ed. McGraw-Hill Science/Engineering/Math, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Data Communications Networking (McGraw-Hill Forouzan Networking). McGraw-Hill Science/Engineering/Math, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Data Communications and Networking (McGraw-Hill Forouzan Networking). McGraw-Hill Higher Education, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Firewall Model"

1

Brucker, Achim D., Lukas Brügger, and Burkhart Wolff. "Model-Based Firewall Conformance Testing." In Testing of Software and Communicating Systems, 103–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-68524-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Botvinko, Anatoly, and Konstantin Samouylov. "Firewall Simulation Model with Filtering Rules Ranking." In Communications in Computer and Information Science, 533–45. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66242-4_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Weiping, Wenhui Chen, Zhepeng Li, and Huaping Chen. "Comparison Model and Algorithm for Distributed Firewall Policy." In Lecture Notes in Computer Science, 545–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-37275-2_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Akram, Raja Naeem, Konstantinos Markantonakis, and Keith Mayes. "Firewall Mechanism in a User Centric Smart Card Ownership Model." In Lecture Notes in Computer Science, 118–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12510-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hachana, Safaà, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, and Stephane Morucci. "Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management." In Information Systems Security, 133–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cubukcu, Ceren, and Cem Cantekin. "Using a Fuzzy-AHP Decision Model for Selecting the Best Firewall Alternative." In Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation, 426–33. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85626-7_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Choudhury, Madhab Paul, and J. Paul Choudhury. "Machine Learning Based Model to Find Out Firewall Decisions Towards Improving Cyber Defence." In Lecture Notes in Networks and Systems, 179–95. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9719-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan, Hui, Lei Zheng, Liang Dong, Xiangli Peng, Yan Zhuang, and Guoru Deng. "Research and Implementation of WEB Application Firewall Based on Feature Matching." In Application of Intelligent Systems in Multi-modal Information Analytics, 1223–31. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15740-1_154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Piprani, Baba. "Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse." In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 1148–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11915072_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Piprani, Baba. "Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse (Extended Version)." In Journal on Data Semantics XI, 94–125. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92148-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Firewall Model"

1

Liyanage, Geethapriya, and Shantha Fernando. "Firewall model for cloud computing." In 2013 IEEE 8th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2013. http://dx.doi.org/10.1109/iciinfs.2013.6731960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeffrey, Alan, and Taghrid Samak. "Model Checking Firewall Policy Configurations." In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Basumatary, Nayan, and Shyamanta M. Hazarika. "Model checking a firewall for anomalies." In 2013 1st International Conference on Emerging Trends and Applications in Computer Science (ICETACS). IEEE, 2013. http://dx.doi.org/10.1109/icetacs.2013.6691402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pereira, Fabio Dacencio, and Edward David Moreno Ordonez. "SSDR - Reconfigurable Firewall: Reconfiguration Model Impact." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pereira, Fabio Dacencio, and Edward David Moreno Ordonez. "SSDR - Reconfigurable Firewall: Reconfiguration Model Performance." In 2008 4th Southern Conference on Programmable Logic (SPL). IEEE, 2008. http://dx.doi.org/10.1109/spl.2008.4547770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Weiping, Heran Chen, Jiayao Chen, and Bowen Liu. "Firewall Rule Ordering Based on Statistical Model." In 2009 International Conference on Computer Engineering and Technology (ICCET). IEEE, 2009. http://dx.doi.org/10.1109/iccet.2009.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

InSeon Yoo. "Adaptive firewall model to detect email viruses." In Proceedings. IEEE 38th Annual 2004 International Carnahan Conference on Security Technology. IEEE, 2004. http://dx.doi.org/10.1109/ccst.2004.1405392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Horowitz, Eduardo, and Luis C. Lamb. "A Hierarchical Model for Firewall Policy Extraction." In 2009 International Conference on Advanced Information Networking and Applications. IEEE, 2009. http://dx.doi.org/10.1109/aina.2009.116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Weiping, Rong Ji, Wenhui Chen, Bo Chen, and Zhepeng Li. "Firewall Rules Sorting Based on Markov Model." In The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007). IEEE, 2007. http://dx.doi.org/10.1109/isdpe.2007.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gheorghica, Daniel, and Victor Croitoru. "Secure and flexible model for firewall policy management." In 2010 9th International Symposium on Electronics and Telecommunications (ISETC 2010). IEEE, 2010. http://dx.doi.org/10.1109/isetc.2010.5679366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography