Proficient toning mechanism for firewall policy assessment
暂无分享,去创建一个
[1] Avishai Wool,et al. The Geometric Efficient Matching Algorithm for Firewalls , 2004, IEEE Transactions on Dependable and Secure Computing.
[2] George Varghese,et al. Scalable packet classification , 2001, SIGCOMM 2001.
[3] Anja Feldmann,et al. Tradeoffs for packet classification , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[4] David E. Taylor. Survey and taxonomy of packet classification techniques , 2005, CSUR.
[5] R. Krishnan,et al. DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET 1 , 2012 .
[6] Zhan Zhang,et al. Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls , 2010, IEEE Transactions on Computers.
[7] Sonia Fahmy,et al. A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals , 2001, Comput. Secur..
[8] Mohamed G. Gouda,et al. A model of stateful firewalls and its properties , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[9] Chad R. Meiners,et al. All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Sonia Fahmy,et al. Refereed papers: A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals1 1This work was supported by sponsers of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University. , 2001 .
[11] Paul Dütting,et al. Offline file assignments for online load balancing , 2011, Inf. Process. Lett..
[12] George Varghese,et al. Fast firewall implementations for software and hardware-based routers , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[13] Phaltane Anjali.D. GEOMETRIC EFFICIENT MATCHING ALGORITHM FOR FIREWALLS , 2014 .
[14] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[15] Karen A. Scarfone,et al. Guidelines on Firewalls and Firewall Policy , 2009 .
[16] George Varghese,et al. Fast firewall implementations for software-based and hardware-based routers , 2001, SIGMETRICS '01.
[17] Avishai Wool,et al. Firmato: a novel firewall management toolkit , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[18] Avishai Wool,et al. Remote Algorithmic Complexity Attacks against Randomized Hash Tables , 2007, SECRYPT.
[19] David Eppstein,et al. Internet packet filter management and rectangle geometry , 2000, SODA '01.
[20] Eric Torng,et al. Firewall Compressor: An Algorithm for Minimizing Firewall Policies , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.