Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

A hybrid formal verification approach for QoS-aware multi-cloud service composition

A Souri, AM Rahmani, NJ Navimipour, R Rezaei - Cluster Computing, 2020 - Springer
Today, cloud providers represent their individual services with several functional and non-
functional properties in various environments. Discovering and selecting an appropriate …

Can my firewall system enforce this policy?

L Ceragioli, P Degano, L Galletta - Computers & Security, 2022 - Elsevier
Firewalls are a fundamental tool for managing and protecting computer networks. They
behave according to a configuration that specifies the desired policy, ie, which packets are …

A systematic study of network firewall and its implementation

R Alsaqour, A Motmi, M Abdelhaq - International Journal of …, 2021 - koreascience.kr
This is an era of technology and with the rapid growth of the Internet, networks are
continuously growing. Companies are shifting from simple to more complex networks. Since …

Analysis of effectiveness of iptables on web server from slowloris attack

P Oktivasari, AR Zain, M Agustin… - … of Computer and …, 2022 - ieeexplore.ieee.org
In the application of network technology, a Web Server is needed that can run well, by
providing data services that have the function to accept HTTP or HTTPS requests by …

[图书][B] Cybersecurity: a practical engineering approach

HMD Santos - 2022 - taylorfrancis.com
Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure
cyber architecture, beginning with the identification of security risks. It then builds solutions …

FWS: Analyzing, maintaining and transcompiling firewalls

C Bodei, L Ceragioli, P Degano… - Journal of …, 2021 - content.iospress.com
Firewalls are essential for managing and protecting computer networks. They permit
specifying which packets are allowed to enter a network, and also how these packets are …

Implementasi Teknologi Firewall Sebagai Keamanan Server Dari Syn Flood Attack

S Sahren - JURTEKSI (Jurnal Teknologi dan Sistem Informasi …, 2021 - jurnal.stmikroyal.ac.id
Dimasa pandemi Covid-19 saat ini sistem informasi akademik secara terpusat sangat rawan
terhadap berbagai bentuk serangan, seperti SYN Flood, ICMP Flood, DoS, dll. Serangan ini …

Eficacia y eficiencia de la seguridad de las redes LAN. Cantón Pasaje

NVL Leyva, DMG Ayabaca, CRB Flores… - Sociedad & …, 2021 - institutojubones.edu.ec
Con el objetivo de analizar la efectividad y eficacia de la seguridad de las redes LAN
brindadas por las empresas proveedoras de los servicios de internet del Cantón de Pasaje …

Design and Implementation of TLS Traffic Packet Filtering Technology Based on Netfilter Framework

J Cheng, C Li - 2022 7th International Conference on Cyber …, 2022 - ieeexplore.ieee.org
When using firewall technology to block network traffic, unexpected blocking often occurs.
The main reason is that one IP will correspond to multiple domain names with the …