• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 29
  • 12
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 53
  • 40
  • 29
  • 17
  • 15
  • 11
  • 10
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Linux framework for firewall testing

Prabhakar, Durga. 10 April 2008 (has links)
No description available.
2

PBit : a pattern based testing framework for Linux iptables

Du, Yong. 10 April 2008 (has links)
Firewall testing is important because fifewall faults can lead to security failures. Firewall testing is hard because firewall rules havdp&a+eters, producing a huge number of possible parameter combinations. This thesis presents a firewall testing methodology based on test templates, which are parameterized test cases. A firewall testing framework for iptables, the Linux firewall subsystem, has been implemented. Twelve test templates have been created for testing iptables parameters and extensions. A GUI tool is also provided to integrate these test templates with various test generation strategies. The most important of these strategies, painvise generation, has been investigated in detail. Based on the investigation, we developed an improved painvise generation algorithm.
3

Gestão centralizada de firewalls distribuídas em ambientes heterogéneos

Monteiro, Pedro Filipe Brito Duarte Martins January 2006 (has links)
Tese de mestrado. Redes e Serviços de Comunicação. 2006. Faculdade de Engenharia. Universidade do Porto
4

A theory for the design and analysis of firewalls

Liu, Xiang-Yang Alexander 28 August 2008 (has links)
Not available / text
5

A theory for the design and analysis of firewalls

Liu, Xiang-Yang Alexander, January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2006. / Vita. Includes bibliographical references.
6

Self-adaptable Security Monitoring for IaaS Cloud Environments / Supervision de sécurité auto-adaptative dans les clouds IaaS

Giannakou, Anna 06 July 2017 (has links)
Les principales caractéristiques des clouds d'infrastructure (laaS), comme l'élasticité instantanée et la mise à disposition automatique de ressources virtuelles, rendent ces clouds très dynamiques. Cette nature dynamique se traduit par de fréquents changements aux différents niveaux de l'infrastructure virtuelle. Étant données la criticité et parfois la confidentialité des informations traitées dans les infrastructures virtuelles des clients, la supervision de sécurité est une préoccupation importante pour les clients comme pour le fournisseur de cloud. Malheureusement, les changements dynamiques altèrent la capacité du système de supervision de sécurité à détecter avec succès les attaques ciblant les infrastructures virtuelles. Dans cette thèse, nous avons conçu un système de supervision de sécurité auto-adaptatif pour les clouds laaS. Ce système est conçu pour adapter ses composants en fonction des différents changements pouvant se produire dans une infrastructure de cloud. Notre système est instancié sous deux formes ciblant des équipements de sécurité différents : SAIDS, un système de détection d'intrusion réseau qui passe à l'échelle, et AL-SAFE, un firewall applicatif fondé sur l'introspection. Nous avons évalué notre prototype sous l'angle de la performance, du coût, et de la sécurité pour les clients comme pour le fournisseur. Nos résultats montrent que notre prototype impose un coût additionnel tolérable tout en fournissant une bonne qualité de détection. / Rapid elasticity and automatic provisioning of virtual resources are some of the main characteristics of laaS clouds. The dynamic nature of laaS clouds is translated to frequent changes that refer to different levels of the virtual infrastructure. Due to the critical and sometimes private information hosted in tenant virtual infrastructures, security monitoring is of great concern for both tenants and the provider. Unfortunately, the dynamic changes affect the ability of a security monitoring framework to successfully detect attacks that target cloud-hosted virtual infrastructures. In this thesis we have designed a self-adaptable security monitoring framework for laaS cloud environments that is designed to adapt its components based on different changes that occur in a virtual infrastructure. Our framework has two instantiations focused on different security devices: SAIDS, a scalable network intrusion detection system, and AL-SAFE, an introspection-based application-level firewall. We have evaluated our prototype focusing on performance, cost and security for both tenants and the provider. Our results demonstrate that our prototype imposes a tolerable overhead while providing accurate detection results.
7

Firewall monitoring using intrusion detection systems/

Asarcıklı, Şükran. Tuğlular, Tuğkan. January 2005 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2005 / Keywords: Intrusion detection system, firewall. Includes bibliographical references (leaves 79-81)
8

Modeling and analyzing intrusion attempts to a comuter network operating in a defense-in-depth posture /

Givens, Mark Allen. January 2004 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Alex Bordetsky, Joe Roth. Includes bibliographical references (p. 89-90). Also available online.
9

Evaluation of Embedded Firewall System /

Rumelioglu, Sertac. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2005. / Thesis Advisor(s): Wen Su. Includes bibliographical references (p. 77-79). Also available online.
10

Parallel firewall designs for high-speed networks /

Farley, Ryan Joseph. January 2005 (has links)
Thesis (M.S.)--Wake Forest University. Dept. of Computer Science, 2005. / Vita. Includes bibliographical references (leaves 66-68)

Page generated in 0.0391 seconds