Review of various firewall deployment models

作者: Okta Nurika , Anang Hudaya B Muhamad Aminz , Abdullah Sani Bin Abd Rahman , Mohamed Nordin B Zakaria , None

DOI: 10.1109/ICCISCI.2012.6297140

关键词:

摘要: The firewall deployments have become a favorite research area within IT world. design of framework and the algorithm rule set can affect overall performance filtering system. This review paper discusses some unique researches to build an effective efficient model. application level system must work in manner up fast accurate process. mechanism or how packet is processed from being received at physical layer network card until further by support software such as IDS highly influential for infrastructure.

参考文章(16)
J. G. Alfaro, N. Boulahia-Cuppens, F. Cuppens, Complete analysis of configuration rules to guarantee reliable network security policies International Journal of Information Security. ,vol. 7, pp. 103- 122 ,(2008) , 10.1007/S10207-007-0045-7
Meharouech Sourour, Bouhoula Adel, Abbes Tarek, Ensuring security in depth based on heterogeneous network security technologies International Journal of Information Security. ,vol. 8, pp. 233- 246 ,(2009) , 10.1007/S10207-009-0077-2
Mohammad Zulkernine, Mathews Graves, Muhammad Umair Ahmed Khan, Integrating software specifications into intrusion detection International Journal of Information Security. ,vol. 6, pp. 345- 357 ,(2007) , 10.1007/S10207-007-0023-0
Long-zheng Cai, Jian Chen, Yun Ke, Tao Chen, Zhi-gang Li, A new data normalization method for unsupervised anomaly intrusion detection Journal of Zhejiang University Science C. ,vol. 11, pp. 778- 784 ,(2010) , 10.1631/JZUS.C0910625
Anoosha Prathapani, Lakshmi Santhanam, Dharma P. Agrawal, Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents The Journal of Supercomputing. ,vol. 64, pp. 777- 804 ,(2013) , 10.1007/S11227-010-0547-3
Hai Jin, Guofu Xiang, Deqing Zou, Song Wu, Feng Zhao, Min Li, Weide Zheng, A VMM-based intrusion prevention system in cloud computing environment The Journal of Supercomputing. ,vol. 66, pp. 1133- 1151 ,(2013) , 10.1007/S11227-011-0608-2
John Govaerts, Arosha Bandara, Kevin Curran, A formal logic approach to firewall packet filtering analysis and generation Artificial Intelligence Review. ,vol. 29, pp. 223- 248 ,(2008) , 10.1007/S10462-009-9147-0
Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi, A high-performance and scalable multi-core aware software solution for network monitoring The Journal of Supercomputing. ,vol. 59, pp. 720- 743 ,(2012) , 10.1007/S11227-010-0469-0
Dan Wing, Network Address Translation: Extending the Internet Address Space IEEE Internet Computing. ,vol. 14, pp. 66- 70 ,(2010) , 10.1109/MIC.2010.96
Lawrence Bernstein, Network Management Isn't Dying, It's Just Fading Away Journal of Network and Systems Management. ,vol. 15, pp. 419- 424 ,(2007) , 10.1007/S10922-007-9080-Y