Nothing Special   »   [go: up one dir, main page]

Zhou, 2013 - Google Patents

Comparing Dedicated and Integrated Firewall Performance

Zhou, 2013

View PDF
Document ID
8839051654751336009
Author
Zhou Q
Publication year

External Links

Snippet

Because of the popularity and benefits of using Internet, corresponding Internet and network security threats also increase year by year. Firewalls are used to be the main protector for an organization. Initially, we have the packet filtering firewall to control traffic and provide …
Continue reading at www.theseus.fi (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US10630725B2 (en) Identity-based internet protocol networking
US9882876B2 (en) System and method for redirected firewall discovery in a network environment
KR20140130114A (en) System and method for interlocking a host and a gateway
EP2769514A1 (en) System and method for host-initiated firewall discovery in a network environment
Alabady Design and Implementation of a Network Security Model for Cooperative Network.
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Jain et al. A survey on Man in the Middle Attack
Foltz et al. Enterprise considerations for ports and protocols
Mayukha et al. Various Possible Attacks and Mitigations of the OSI Model Layers Through Pentesting–An Overview
van Oorschot et al. Firewalls and tunnels
Zhou Comparing Dedicated and Integrated Firewall Performance
Balogun Distributed firewalls mechanism for the resolution of packets forwarding problems in computer networks using RSA-CRT technique
Bahaa Preventing brute force attack through the analyzing log
Kokko Next-generation firewall case study
Yeo Personal firewalls for administrators and remote users
Vasile Firewall Technologies
Davis Constructing and Probing a Fortified Network
Gurusamy DIPLOMA THESIS ASSIGNMENT
Etuk Effiong CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN MODERN NETWORK SECURITY
Beyene Firewalls in Linux: Principles and Implementation
Sulaman An Analysis and Comparison of The Security Features of Firewalls and IDSs
Simone 9, Author retains full rights.
Gashi Implementing network security at Layer 2 and Layer 3 OSI model
Hubbard et al. Firewalling the net
Zeng Network security and implementation based on IPV6