Spelling suggestions: "subject:"firewall"" "subject:"sirewall""
1 |
Firewall mit nutzerindividuellen RegelnJehmlich, Heiko. January 2003 (has links)
Chemnitz, Techn. Univ., Studienarb., 2003.
|
2 |
Comparative Firewall Study an extensive comparison of open source and several commercial firewall systems suitable for middle-sized companys /Höfler, Torsten. Burkert, Christian. Telzer, Martin. January 2004 (has links)
Chemnitz, Techn. Univ., Studienarb., 2004.
|
3 |
Reusable Annotations for Matching of Event Sequences to Construct Firewall PoliciesFlores-Huerta, Heric 04 April 2019 (has links)
Organizations of all types use firewall systems to protect their networks from threats. Those firewalls are governed by the policies used to configure them. The PEACE (Policy Enforcement and Access Control for End-points) system is a new combination, network-plus-host based firewall that gives analysts a novel new set of data to build policy attributes for. This data are semi-structured strings that represent the hierarchy of graphical user interface components that have been interacted with around the time that host sent a network request. The multivariate, hierarchical, semi-structured nature of this data can make it a laborious or non-intuitive task to create the string matching rules that are used by the firewall policies. We present a targeted, interactive, event-sequence based \cite{cappers2017exploring} tool for the purpose of building policies for the PEACE firewall system's graphical user interface data.
|
4 |
A new approach to designing firewall based on multidimensional matrixCheng, Y.Z., Wang, W.P., Min, Geyong, Wang, J.X. 27 November 2013 (has links)
No / Firewalls are crucial elements to enhance network security by examining the field value of every packet and decide whether to accept or discard the packet according to the firewall policy. However, the design of firewall policies, especially for enterprise networks, is complex and error-prone. This paper aims to propose an effective firewall design method to ensure the consistency, compactness and completeness of firewall rules. Specifically, we develop a new designing model, namely firewall design matrix, and the corresponding construction algorithm for mapping firewall rules to firewall design matrix. A firewall generation algorithm is proposed to generate the target firewall rules that are equivalent to the original ones while maintaining the completeness. Theoretical proof and extensive experiments on both real-world and synthetic firewalls are conducted to evaluate the performance of the proposed method. The results demonstrate that it can achieve a high compression ratio efficiently while maintaining the firewall rules conflict-free. Copyright (c) 2013 John Wiley & Sons, Ltd.
|
5 |
Dynamic silicon firewallLaturnas, Darrell Keith 20 September 2006
Computers are networked together in order to share the information they store and process. The internet connects many of these networks together, offering a multitude of options for communication, productivity and entertainment. It also offers the opportunity for unscrupulous individuals to contact these networked computers and attempt to appropriate or destroy the data on them, the computing resources they provide, and the identity or reputation of the computer user. Measures to secure networks need to be implemented by network administrators and users to protect their computing assets. <p>Firewalls filter information as it flows through a network. This filter can be implemented in hardware or software and can be used to protect computers from unwanted access. While software firewalls are considered easier to set up and use, hardware firewalls are often considered faster and more secure. Absent from the marketplace is an embedded hardware solution applicable to desktop systems. <p>Traditional software firewalls use the processor of the computer to filter packets; this is disadvantageous because the computer can become unusable during a network attack when the processor is swamped by the firewall process. Traditional hardware firewalls are usually implemented in a single location, between a private network and the internet. Depending on the size of the private network, a hardware firewall may be responsible for filtering the network traffic of hundreds of clients. This not only makes the required hardware firewall quite expensive, but dedicates those financial resources to a single point that may fail. <p>The dynamic silicon firewall project implements a hardware firewall using a soft-core processor with a custom peripheral designed using a hardware description language. Embedding this hardware firewall on each network interface card in a network would offer many benefits. It would avoid the aforementioned denial of service problem that software firewalls are susceptible to since the custom peripheral handles the filtering of packets. It could also reduce the complexity required to secure a large private network, and eliminate the problem of a single point of failure. Also, the dynamic silicon firewall requires little to no administration since the filtering rules change with the users network activity. The design of the dynamic silicon firewall incorporates the best features from traditional hardware and software firewalls, while minimizing or avoiding the negative aspects of each.
|
6 |
Dynamic silicon firewallLaturnas, Darrell Keith 20 September 2006 (has links)
Computers are networked together in order to share the information they store and process. The internet connects many of these networks together, offering a multitude of options for communication, productivity and entertainment. It also offers the opportunity for unscrupulous individuals to contact these networked computers and attempt to appropriate or destroy the data on them, the computing resources they provide, and the identity or reputation of the computer user. Measures to secure networks need to be implemented by network administrators and users to protect their computing assets. <p>Firewalls filter information as it flows through a network. This filter can be implemented in hardware or software and can be used to protect computers from unwanted access. While software firewalls are considered easier to set up and use, hardware firewalls are often considered faster and more secure. Absent from the marketplace is an embedded hardware solution applicable to desktop systems. <p>Traditional software firewalls use the processor of the computer to filter packets; this is disadvantageous because the computer can become unusable during a network attack when the processor is swamped by the firewall process. Traditional hardware firewalls are usually implemented in a single location, between a private network and the internet. Depending on the size of the private network, a hardware firewall may be responsible for filtering the network traffic of hundreds of clients. This not only makes the required hardware firewall quite expensive, but dedicates those financial resources to a single point that may fail. <p>The dynamic silicon firewall project implements a hardware firewall using a soft-core processor with a custom peripheral designed using a hardware description language. Embedding this hardware firewall on each network interface card in a network would offer many benefits. It would avoid the aforementioned denial of service problem that software firewalls are susceptible to since the custom peripheral handles the filtering of packets. It could also reduce the complexity required to secure a large private network, and eliminate the problem of a single point of failure. Also, the dynamic silicon firewall requires little to no administration since the filtering rules change with the users network activity. The design of the dynamic silicon firewall incorporates the best features from traditional hardware and software firewalls, while minimizing or avoiding the negative aspects of each.
|
7 |
Differenzierte Bereitstellung von Internetdiensten in öffentlichen Bereichen der UniversitätBreiler, André. January 2001 (has links)
Chemnitz, Techn. Univ., Diplomarb., 2000.
|
8 |
Zugangsmanagement für Wireless LANParthey, Mirko. January 2001 (has links)
Chemnitz, Techn. Univ., Diplomarb., 2001.
|
9 |
Firewalls in HochgeschwindigkeitsnetzenEllermann, Uwe. Unknown Date (has links) (PDF)
Universiẗat, Diss., 1999--Hamburg.
|
10 |
Návrh integrace IPv6 do počítačové sítě Mendelovy univerzity v Brně v oblasti bezpečnosti a síťových služebŠturma, Michal January 2017 (has links)
This diploma thesis focuses on the complete analysis and design of security and network services at Mendel university in Brno. The thesis contains analysis of current solution using the IPv4 protocol. Based on the analysis a new solution is designed and implemented. The resolution is tested and evaluated in laboratory conditions. Economic evaluation is part of this thesis as well.
|
Page generated in 0.0338 seconds