An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay
暂无分享,去创建一个
Xiangjian He | Zhiyuan Tan | Priyadarsi Nanda | Thawatchai Chomsiri | Zhiyuan Tan | Xiangjian He | P. Nanda | T. Chomsiri
[1] Pasi Eronen,et al. An expert system for analyzing firewall rules , 2001 .
[2] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[3] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[4] Hiroshi Nagamochi,et al. Linear-tree rule structure for firewall optimization , 2007, Communications, Internet, and Information Technology.
[5] Scott Hazelhurst. Algorithms for Analysing Firewall and Router Access Lists , 2000, ArXiv.
[6] Chen-Nee Chuah,et al. FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[7] Pablo Neira Ayuso,et al. Netfilter's Connection Tracking System , 2006, login Usenix Mag..
[8] José María,et al. Mecanismo para el acceso público a servidores con direccionamiento privado , 2011 .
[9] Thawatchai Chomsiri,et al. Firewall Policy Analyzing by Relational Algebra , 2004 .
[10] Ehab Al-Shaer,et al. Conflict classification and analysis of distributed firewall policies , 2005, IEEE Journal on Selected Areas in Communications.
[11] Xiangjian He,et al. Improving cloud network security using the Tree-Rule firewall , 2014, Future Gener. Comput. Syst..
[12] Xiangjian He,et al. Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall , 2012, IDCS.