2019 International Conference on Information Science and Communications Technologies (ICISCT) 2019
DOI: 10.1109/icisct47635.2019.9011933
|View full text |Cite
|
Sign up to set email alerts
|

Method of constucting packet filtering rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Filtering Approaches. Traditional firewalls and IDSs use packet inspection for filtering traffic based on malware impressions [27][28][29]. The workable solution proposed in [28] used a conceptual 'trust' based filtering that only allowed 'useful' packets to pass through.…”
Section: Iot Based Ids Implementationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Filtering Approaches. Traditional firewalls and IDSs use packet inspection for filtering traffic based on malware impressions [27][28][29]. The workable solution proposed in [28] used a conceptual 'trust' based filtering that only allowed 'useful' packets to pass through.…”
Section: Iot Based Ids Implementationsmentioning
confidence: 99%
“…Since, iCDS mostly deals with identifying and filtering malicious contents from external network traffic trying to penetrate inside an SME network, insider attacks at this stage of the research is not considered. The filtering approach presented in [27] consisted of a restriction and access policy working as a traditional gateway. However, no evidence of experimental evaluation of the approach is proposed.…”
Section: Iot Based Ids Implementationsmentioning
confidence: 99%
“…Internet sockets serves as endpoints of channels for data communication flows within 5G network and it is through these sockets that application connections are actualized between clients and servers in the internet. For each one of these sockets across the internet is a unique combination of appropriate local transport communications port and local IP address, target appropriate communication port and target IP address, as well as type of transport protocol [11]. To flag the proper internet socket distinctively chosen by the client-server application, the use of internet protocol is necessary in order to establish target communication between client and server.…”
Section: G Network Architecturementioning
confidence: 99%