2012 International Conference on Computer &Amp; Information Science (ICCIS) 2012
DOI: 10.1109/iccisci.2012.6297140
|View full text |Cite
|
Sign up to set email alerts
|

Review of various firewall deployment models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…This method gives the capability of auto-generation of rules for packets that do not match with any rule by the use of a rule-based expert system that employs the previously defined rules in deducing new rules [21]. A short summary of the existing literature on packet filtering can be found in [3]. Despite of the variety of existing packet filtering techniques, we believe that there are still many paths to be explored in the field of intelligence firewalls.…”
Section: Literature Surveymentioning
confidence: 99%
See 4 more Smart Citations
“…This method gives the capability of auto-generation of rules for packets that do not match with any rule by the use of a rule-based expert system that employs the previously defined rules in deducing new rules [21]. A short summary of the existing literature on packet filtering can be found in [3]. Despite of the variety of existing packet filtering techniques, we believe that there are still many paths to be explored in the field of intelligence firewalls.…”
Section: Literature Surveymentioning
confidence: 99%
“…Firewall have many abilities like defines a single choke point that keeps unauthorized users out of the protected network, prohibits potentially vulnerable services from entering or leaving the network, provides a location for monitoring security-related events, audits and alerts action also can be implemented by firewall system [3]. Furthermore, it can serve as the platform for IP security, and can be used to implement virtual private networks.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations