Firewall
Firewall的相关文献在1996年到2022年内共计112篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、经济计划与管理
等领域,其中期刊论文106篇、会议论文1篇、专利文献5篇;相关期刊64种,包括管理观察、网迷、信息安全与通信保密等;
相关会议1种,包括重庆市电机工程学会2000年学术会议等;Firewall的相关文献由102位作者贡献,包括徐剑秋、熊常春、Sanjeev Kumar等。
Firewall
-研究学者
- 徐剑秋
- 熊常春
- Sanjeev Kumar
- Raja Sekhar Reddy Gade
- A.Shankar
- Ajay Kumar
- Amanullah Mto
- Aoouch@cnBeta
- Aqeel ur Rehman
- Bill
- Black Beasz(译)
- Danny Pineda
- Devashi Tandon
- Eagle
- Fontaine Rafamantanantsoa
- Haja Louis Rabetafika
- Hermes Eslava
- K.Abhishek
- Kewei Sha
- Luis Alejandro Rojas
- M. Rahman
- M.R.Ghalib
- MA Qinglu
- Pratyush Parimal
- Sadegh Davari
- Saleem-Ullah Lar
- Sirisha Surisetty
- Student Member
- T.Andrew Yang
- Wei Wei
- X.Cheng
- Xiaofeng Liao
- dream
- kumbayo
- 万立夫
- 伍裕标
- 刘占文
- 刘志勇
- 刘景云
- 单红光
- 卢泽新
- 卢锡城
- 卿斯汉
- 原箐
- 吕文龙
- 吕明
- 吕晓薇
- 吕朋
- 吴刚
- 周吉光
-
-
顾武雄
-
-
摘要:
企业网络只要对外通信,信息安全威胁就可能随之而来。在众多信息安全管理方案中,边界安全的考虑与重要性肯定是第一位的。想要解决各式各样的边缘网络威胁,企业是否一定要投入庞大的IT预算才能够解决呢?那可不一定,因为在一定程度上,采用以开源为基础的软件程序包,就能够让您的企业以最低的成本,享有最高的网络安全环境。
-
-
Ajay Kumar;
K.Abhishek;
M.R.Ghalib;
A.Shankar;
X.Cheng
-
-
摘要:
Internet of Things(IoT)security is the act of securing IoT devices and networks.IoT devices,including industrial machines,smart energy grids,and building automation,are extremely vulnerable.With the goal of shielding network systems from illegal access in cloud servers and IoT systems,Intrusion Detection Systems(IDSs)and Network-based Intrusion Prevention Systems(NBIPSs)are proposed in this study.An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering.The proposed NBIPS inspects network activity streams to identify and counteract misuse instances.The NBIPS is usually located specifically behind a firewall,and it provides a reciprocal layer of investigation that adversely chooses unsafe substances.Networkbased IPS sensors can be installed either in an inline or a passive model.An inline sensor is installed to monitor the traffic passing through it.The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.
-
-
吴刚
-
-
摘要:
针对Iptables和Firewalld两种防火墙的4种主要应用分别做了服务器允许指定客户端访问指定服务,NAT内网客户端访问外网服务器,外网客户端访问NAT内网服务器,单向Ping功能的实验验证,据此探讨和总结了两种防火墙的理论和配置区别。
-
-
-
Kewei Sha;
T.Andrew Yang;
Wei Wei;
Sadegh Davari
-
-
摘要:
Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk.Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications.As an extension of the cloud,the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications.Although there are some research efforts in this area,edge-based security designs for IoT applications are still in its infancy.This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs.We first present an edge-centric IoT architecture.Then,we extensively review the edge-based IoT security research efforts in the context of security architecture designs,firewalls,intrusion detection systems,authentication and authorization protocols,and privacy-preserving mechanisms.Finally,we propose our insight into future research directions and open research issues.
-
-
Devashi Tandon;
Pratyush Parimal
-
-
摘要:
In today’s world, computer networks form an essential part of any organization. They are used not only to communicate information amongst the various parties involved but also to process data and store critical information which is accessible to approved subscribers. Protecting critical data, ensuring confidentiality, and thwarting illegal access are primary concerns for such organizations. This case study presents security recommendations for any such organization, to assist them in defining security policies at various levels of the network infrastructure.
-
-
Fontaine Rafamantanantsoa;
Haja Louis Rabetafika
-
-
摘要:
In recent years, the number of users connected to the Internet has experienced a phenomenal growth. The security of systems and networks become essential. That is why the performance of Linux firewall and Berkeley Software Distribution (BSD) are of paramount importance in security systems and networks in all businesses. The following evaluates the firewall based tool that we have developed in Python and Scapy, which performs time measurements by serving packets traversing the firewall test. Several results were presented: the speed of the firewall under FreeBSD in terms of service time compared to the speed of the firewall under Linux as the number of rules increases;the speed of the filtering rule of a firewall stateless in terms of service time compared to the filtering rule of an active firewall gradually as the number of rules increases. Then, for care of simplicity, we have presented the queue M/M/1/K to model the performances of firewalls. The resulting model was validated using Simulink and mean squared error. The analytical model and Simulink of the firewalls are presented in the article.
-
-
胡吉
-
-
摘要:
随着移动应用的广泛普及,专门针对移动应用进行的攻击也日益增长,通过IPS、NGFW、WAF等传统安全设备无法对这些攻击进行有效防御,因此需要一种更加专业的安全设备来对这些攻击进行防御,这就是移动应用防火墙(Mobile Application Firewall)6月25日,在WOT2016企业安全技术峰会上,盛邦安全首席营销官(副总裁)严雷正式宣告将推出首台移动应用防火墙——"幻影"。移动应用防火墙的概念由盛邦安全(Web RAY)提出。
-
-
-
-
-
摘要:
英国电信(BT)协同帕洛阿尔托网络(Palo Alto Networks)近日宣布达成协议,BT全球安全服务产品将整合集成Palo Alto Net works下一代安全平台。BT全世界的客户均能从Palo Alto及BT集成的服务中获益,这项服务不仅注重漏洞防御,并且具有BT安全服务遍布全球规模的优势。