Zhou, 2013 - Google Patents
Comparing Dedicated and Integrated Firewall PerformanceZhou, 2013
View PDF- Document ID
- 8839051654751336009
- Author
- Zhou Q
- Publication year
External Links
Snippet
Because of the popularity and benefits of using Internet, corresponding Internet and network security threats also increase year by year. Firewalls are used to be the main protector for an organization. Initially, we have the packet filtering firewall to control traffic and provide …
- 238000001914 filtration 0 abstract description 43
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10630725B2 (en) | Identity-based internet protocol networking | |
US9882876B2 (en) | System and method for redirected firewall discovery in a network environment | |
KR20140130114A (en) | System and method for interlocking a host and a gateway | |
EP2769514A1 (en) | System and method for host-initiated firewall discovery in a network environment | |
Alabady | Design and Implementation of a Network Security Model for Cooperative Network. | |
Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
Jain et al. | A survey on Man in the Middle Attack | |
Foltz et al. | Enterprise considerations for ports and protocols | |
Mayukha et al. | Various Possible Attacks and Mitigations of the OSI Model Layers Through Pentesting–An Overview | |
van Oorschot et al. | Firewalls and tunnels | |
Zhou | Comparing Dedicated and Integrated Firewall Performance | |
Balogun | Distributed firewalls mechanism for the resolution of packets forwarding problems in computer networks using RSA-CRT technique | |
Bahaa | Preventing brute force attack through the analyzing log | |
Kokko | Next-generation firewall case study | |
Yeo | Personal firewalls for administrators and remote users | |
Vasile | Firewall Technologies | |
Davis | Constructing and Probing a Fortified Network | |
Gurusamy | DIPLOMA THESIS ASSIGNMENT | |
Etuk Effiong | CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN MODERN NETWORK SECURITY | |
Beyene | Firewalls in Linux: Principles and Implementation | |
Sulaman | An Analysis and Comparison of The Security Features of Firewalls and IDSs | |
Simone | 9, Author retains full rights. | |
Gashi | Implementing network security at Layer 2 and Layer 3 OSI model | |
Hubbard et al. | Firewalling the net | |
Zeng | Network security and implementation based on IPV6 |