A primary goal of this paper is to develop a heuristic approach based on genetic algorithms to enhance the firewall performance. Typical firewall policies may have thousands of rules and determining an optimal rule order that minimizes the average number of rule comparisons while maintaining the policy integrity is proven to be NP-hard. This problem is formulated as a binary integer program for which an optimal solution is obtained using the branch-and-bound technique. Then an alternative solution approach is devised based on genetic algorithms. Several experiments are conducted to evaluate the effectiveness of the proposed approach as compared to other rule-ordering techniques. Empirical results show the potential and flexibility of the pr...
Abstract—There are two primary tasks when doing a Layer 4 firewall security analysis. First, unifyin...
Firewalls are crucial elements that enhance network security by examining the field values of every ...
Using statistical analysis strategy, a large-scale firewall log files is analyzed and two main chara...
A primary goal of this paper is to develop a heuristic approach based on genetic algorithms to enhan...
In today's online connected world, almost all corporate networks use some form of perimeter firewall...
In today's online connected world, almost all corporate networks use some form of perimeter firewall...
Firewall is a system that secures a network, shielding it from access by unauthorized users. A firew...
Abstract: Network performance highly depends on efficiency of the firewall because for each network ...
Abstract The security of a network which is being connected to the Internet is of the highest impor...
Firewall is a vital component in network security. Changes in requirements due to the growth of the ...
In today’s rapidly progressing professional world, internet is being used as a medium for almost eve...
Firewall is a typical security system that extensively secures the private networks. The operation o...
This paper introduces a new method to improve the performance of list oriented firewall systems. Spe...
Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) ...
Abstract—The algorithm of firewall rules matching designed in this paper is based on the idea of div...
Abstract—There are two primary tasks when doing a Layer 4 firewall security analysis. First, unifyin...
Firewalls are crucial elements that enhance network security by examining the field values of every ...
Using statistical analysis strategy, a large-scale firewall log files is analyzed and two main chara...
A primary goal of this paper is to develop a heuristic approach based on genetic algorithms to enhan...
In today's online connected world, almost all corporate networks use some form of perimeter firewall...
In today's online connected world, almost all corporate networks use some form of perimeter firewall...
Firewall is a system that secures a network, shielding it from access by unauthorized users. A firew...
Abstract: Network performance highly depends on efficiency of the firewall because for each network ...
Abstract The security of a network which is being connected to the Internet is of the highest impor...
Firewall is a vital component in network security. Changes in requirements due to the growth of the ...
In today’s rapidly progressing professional world, internet is being used as a medium for almost eve...
Firewall is a typical security system that extensively secures the private networks. The operation o...
This paper introduces a new method to improve the performance of list oriented firewall systems. Spe...
Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) ...
Abstract—The algorithm of firewall rules matching designed in this paper is based on the idea of div...
Abstract—There are two primary tasks when doing a Layer 4 firewall security analysis. First, unifyin...
Firewalls are crucial elements that enhance network security by examining the field values of every ...
Using statistical analysis strategy, a large-scale firewall log files is analyzed and two main chara...