3,297 Hits in 5.2 sec

Application-Aware Firewall Mechanism for Software Defined Networks

Fahad N. Nife, Zbigniew Kotulski
2020 Journal of Network and Systems Management  
In this paper, we propose the application-aware firewall mechanism for SDN, which can be implemented as an extension to the network's controller.  ...  This plane is responsible for data forwarding as well as gathering local information and statistics. The control plane contains one or more connected controllers.  ...  In this paper, we proposed an application-aware firewall approach for securing OpenFlow-based SDN networks. The solution does not impose any change on the SDN model in terms of design and behavior.  ... 
doi:10.1007/s10922-020-09518-z fatcat:n5btbzwym5gijmadnjkvezzi6i

Intelligent Transportation Architecture for Enhanced Security and Integrity in Vehicles Integrated Internet of Things

Surbhi Gill, Pooja Sahni, Paras Chawla, Sukhdeep Kaur
2017 Indian Journal of Science and Technology  
Methods/Statistical Analysis: Dynamic Clustering Enabled Secured IoT method is used to enhance the security and integrity in vehicles integrated IoT.  ...  Objectives: To devise and simulate an effective and novel approach for intelligent transportation architecture with higher security and integrity in vehicles integrated Internet of things.  ...  Still, there is colossal span for the development of novel, unique and effective algorithms.  ... 
doi:10.17485/ijst/2017/v10i10/108251 fatcat:wy6llwfcz5dihcxhohjnufnj7y


J. Britto Dennis, U. Chindhya Baby, S. Sashikumar
2020 Zenodo  
For enhancing the rule based optimization, intelligent feedback mechanism is used so that rules are optimized periodically to achieve efficient performance.  ...  Firewall has become an obligatory part of every organization for the prevention of attacker from the internet.  ...  Traffic Aware Firewall Optimization: A traffic aware optimization framework is developed to improve the operational cost of firewall [13] .  ... 
doi:10.5281/zenodo.3634356 fatcat:nu4bcdbrqjg6voic3456e2rjny

Attack-aware Security Function Chain Reordering [article]

Lukas Iffländer, Nishant Rawtani, Lukas Beierlieb, Nicolas Fella, Klaus-Dieter Lange, Samuel Kounev
2020 arXiv   pre-print
Attack-awareness recognizes self-awareness for security systems regarding the occurring attacks.  ...  We then propose a reordering framework and analyze what aspects are necessary for modeling security service function chains and making decisions regarding the order based on those models.  ...  In addition to introducing the possibilities for dynamic SSFC, SDN also allows augmenting them with traffic and application awareness [15] .  ... 
arXiv:2005.08364v1 fatcat:wvenfnhfgraw7hvwh5jlrvgisy

Traffic-Aware Firewall Optimization Strategies

Subrata Acharya, Jia Wang, Zihui Ge, Taieb Znati, Albert Greenberg
2006 2006 IEEE International Conference on Communications  
In particular, we achieve more than 10 fold performance improvement by using the proposed traffic-aware firewall optimization.  ...  Furthermore, we develop a novel adaptation mechanism that dynamically detects anomalous traffic behavior and adaptively alters the firewall rules to avoid serious performance degradation due to the traffic  ...  The experimental study shows that the firewall optimizer is successful in dynamically exploiting the traffic characteristics to significantly enhance the performance of the firewall.  ... 
doi:10.1109/icc.2006.255101 dblp:conf/icc/AcharyaWGZG06 fatcat:x5emk56gqzg6th3z5ycd2kd2qm

Performance and Information Security Evaluation with Firewalls

Thaier Hayajneh, Bassam Mohd, Awni Itradat, Ahmad Nahar Quttoum
2013 International Journal of Security and Its Applications  
for a stronger one.  ...  In this paper, we present an assessment methodology to analyze the performance of different firewalls platforms.  ...  [16] studied the performance of firewalls using analytical queuing model based on Markov chain.  ... 
doi:10.14257/ijsia.2013.7.6.36 fatcat:z7f5jeovprhtjpsal2tvsp5he4

A dynamic firewall architecture based on multi-source analysis

Muraleedharan Navarikuth, Subramanian Neelakantan, Kalpana Sachan, Uday Pratap Singh, Rahul Kumar, Antashree Mallick
2013 CSI Transactions on ICT  
as K-S test and entropy based for generating dynamic firewall rules.  ...  Firstly, present day firewall is not intelligent enough to be aware of the breaches and attacks happening over the network.  ...  A traffic aware firewall optimization techniques is explained in [1] .  ... 
doi:10.1007/s40012-013-0029-x fatcat:h2iuljmjzraghgvct7unlwa5eq

An Approach for Improving Performance of a Packet Filtering Firewall Based on Fuzzy Petri Net

Ali A. Ali, Saad M. Darwish, Shawkat K. Guirguis
2015 Journal of Advances in Computer Networks  
Another contribution is to present 2-level fuzzy filtering algorithm to enhance ordering of filtering rules list that permits us to model the dynamic behavior of monitoring system concerning uncertainty  ...  With the rapid development of Internet, the security of networks becomes an important issue today and monitoring network traffic is necessary for realizing different purposes such as system performance  ...  This paper presents a new approach for optimizing packet filtering in network security policies based on online traffic statistics.  ... 
doi:10.7763/jacn.2015.v3.144 fatcat:memtzqhwnjfgnhyju365sc67sq

Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance

A. El-Atawy, T. Samak, E. Al-Shaer, H. Li
2007 IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications  
The first technique uses segmentation of the traffic space to achieve disjoint subsets of traffic properties and build bounded depth Huffman trees using the statistics collected for these segments.  ...  The techniques are evaluated and their performance are compared. Moreover, attacks targeting the firewall performance are discussed and corresponding protection schemes are presented.  ...  By injecting a not very high traffic volume, the attacker will be aware of the internal statistics collected by the firewall with a great accuracy.  ... 
doi:10.1109/infcom.2007.106 dblp:conf/infocom/El-AtawySAL07 fatcat:wyb34jfcvfdhfhrtntvxtsoxne

Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks

A. El-Atawy, E. Al-Shaer, T. Tran, R. Boutaba
2009 IEEE INFOCOM 2009 - The 28th Conference on Computer Communications  
Evaluation has shown considerable savings to the overall filtering process, thus saving the firewall processing power and increase overall throughput.  ...  In this paper, we present a techniques that is light weight, traffic-adaptive and can be deployed on top of any filtering mechanism to pre-filter unwanted expensive traffic.  ...  dynamic to traffic properties and based on the policy structure, and previous performance measures.  ... 
doi:10.1109/infcom.2009.5062171 dblp:conf/infocom/El-AtawyATB09 fatcat:ocfptcxutzfzhlrgx3l36koaiu

5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks

Pablo Salva-Garcia, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe, Antonio Skarmeta
2018 Security and Communication Networks  
control loop featured with efficient 5G-aware traffic filtering.  ...  However, insufficient research has been conducted in this crucial area, in particular, few if any solutions are capable of dealing with the multiple encapsulated 5G traffic for IoT security management.  ...  In [12] , a splay tree firewall is proposed to handle packet rejection and acceptance and can perform splay filters reordering based on a statistical model that utilizes traffic characteristic.  ... 
doi:10.1155/2018/9291506 fatcat:een4z3mofvhhbk2drs6zrxgu2q

Protecting Networks from Modern Threats with Next-Generation Firewalls

Rutvik Patel
2021 International Journal of Darshan Institute on Engineering Research & Emerging Technology  
Then we went over the theoretical foundations of firewalls and the features of next-generation firewalls.  ...  The paper aimed to see whether next-generation firewalls are suitable to replace traditional firewalls and thus lead to adequate Internet user security.  ...  Then we will explain the firewall with there exceptional advanced features to enhance the network's security.  ... 
doi:10.32692/ijdi-eret/10.1.2021.2105 fatcat:zenn6uj6bvch5pcqq64lceszgm

ADAMANTIUM project: Enhancing IMS with a PQoS-aware multimedia content management system

Harilaos Koumaras, Daniel Negrou, Fidel Liberal, Javier Arauz, Anastasios Kourtis
2008 2008 IEEE International Conference on Automation, Quality and Testing, Robotics  
ADAMANTIUM proposes an IMS-compatible Multimedia Content Management System (MCMS) focused on performing dynamic cross layer adaptations for optimization of the user experience in terms of perceptual quality  ...  for media services.  ...  PQoS-aware traffic classification.  ... 
doi:10.1109/aqtr.2008.4588768 fatcat:4uigbwwglff53p5sv4gd7uedtm

Technical sessions

2007 2007 12th IEEE Symposium on Computers and Communications  
Error performance Detection (EPD) algorithm is based on the prediction error of the traffic model and regards the error as the statistical variable, comparing with the threshold, which will detect the  ...  we study the statistical properties of the connectivity of Vehicular Ad hoc NETworks (VANETs) with user mobility and dynamic user population at the steady state.  ...  The support of the duality of concerns from network and user view points is expected to enhance the users' experience of desired services, whilst performing seamless and intelligent handovers.  ... 
doi:10.1109/iscc.2007.4381656 fatcat:ktcmax3p5vctve2ll2xduffztu

Load Balancing in Software Defined Networking: A Review

Prabhjot Kaur, Jasmeen Kaur Chahal, Abhinav Bhandari
2018 Asian Journal of Computer Science and Technology  
SDN (Software Defined Networking) is a strategy for making, planning and overseeing systems which intend to change this present unfortunate circumstance.  ...  In the survey, it has been found that SDN load balancing has become more smart and efficient and reduces the statistic collection overhead and maintain better QoS (Quality of Service) data rates.  ...  For the dynamic control of the firewall, the delay and overload are inherent. HongliXu et al.  ... 
doi:10.51983/ajcst-2018.7.2.1859 fatcat:zkgp7cc23bgp7jjznsvxi73w5q
« Previous Showing results 1 — 15 out of 3,297 results