Review of firewall optimization techniques
Firewall is a vital component in network security. Changes in requirements due to the growth of the Internet and increasing types of attack lead to the larger size of firewall policies and consequently affect the firewall performance. Hence, the network security policy will also be jeopardized. Mini...
| Main Authors: | Shakirah, Saidin, Mohamad Fadli, Zolkipli |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Universiti Malaysia Pahang
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/23032/ http://umpir.ump.edu.my/id/eprint/23032/7/Review%20of%20Firewall%20Optimization%20Techniques3.pdf |
Similar Items
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
Design a Technique for Minimizing Unnecessary Handoff
in Mobile Wireless Networks
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Firewalls offer stronger defences
Published: (2008)
Published: (2008)
Firewall Redundancy Rules Filtering Using Integrity Rules Checking
by: Zarina, Dzolkhifli, et al.
Published: (2018)
by: Zarina, Dzolkhifli, et al.
Published: (2018)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Multiple watermarking technique using optimal threshold
by: Noruhida, Alias, et al.
Published: (2020)
by: Noruhida, Alias, et al.
Published: (2020)
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
Optimize performance load balancing techniques using binary vote assignment grid quorum (BVAGQ): A systematic review
by: A., Fairuzullah, et al.
Published: (2019)
by: A., Fairuzullah, et al.
Published: (2019)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
A Survey on Balancing Data Loss Prevention (DLP) with User Privacy in a
Data-Driven World
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Text segmentation techniques: A critical review
by: Pak, Irina *, et al.
Published: (2017)
by: Pak, Irina *, et al.
Published: (2017)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Database System Model of Tender Management System in Kadastra
by: Noraziah, Ahmad, et al.
Published: (2007)
by: Noraziah, Ahmad, et al.
Published: (2007)
New formula to calculate the number of designs in RADG cryptosystem
by: Kadhum, Laith M., et al.
Published: (2021)
by: Kadhum, Laith M., et al.
Published: (2021)
Swarm intelligence optimization algorithms: a review
by: Odili, Julius Beneoluchi, et al.
Published: (2018)
by: Odili, Julius Beneoluchi, et al.
Published: (2018)
A systematic review on emperor penguin optimizer
by: Abdul Kader, Md., et al.
Published: (2021)
by: Abdul Kader, Md., et al.
Published: (2021)
The effect of pre-processing techniques and optimal parameters on BPNN for data classification
by: HUSSEIN, AMEER SALEH
Published: (2015)
by: HUSSEIN, AMEER SALEH
Published: (2015)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
Review on cost-value approach for requirements prioritization techniques
by: Tan, Amelia, et al.
Published: (2018)
by: Tan, Amelia, et al.
Published: (2018)
A Literature Review on Gold Price Predictive Techniques
by: Nurul Asyikin, Zainal, et al.
Published: (2015)
by: Nurul Asyikin, Zainal, et al.
Published: (2015)
Hazard analysis techniques, methods and approaches: A review
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2022)
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2022)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
Similar Items
-
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014) -
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005) -
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al. -
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016) -
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)