Enhancing windows firewall security using fuzzy reasoning

N Naik, P Jenkins - 2016 IEEE 14th Intl Conf on Dependable …, 2016 - ieeexplore.ieee.org
Firewall is a standard security utility within the Microsoft Windows operating system. Most
Windows users adopt it as the default security option due to its free availability. Moreover …

Fuzzy reasoning based windows firewall for preventing denial of service attack

N Naik, P Jenkins - … Conference on Fuzzy Systems (FUZZ-IEEE), 2016 - ieeexplore.ieee.org
Microsoft Windows operating system has the lion's share (approximately 70%), of the
operating system (OS) market. A firewall is a native security utility in Microsoft Windows …

Implementasi teknologi firewall sebagai keamanan server dari syn flood attack

S Sahren - JURTEKSI (Jurnal Teknologi Dan Sistem Informasi …, 2021 - jurnal.stmikroyal.ac.id
Dimasa pandemi Covid-19 saat ini sistem informasi akademik secara terpusat sangat rawan
terhadap berbagai bentuk serangan, seperti SYN Flood, ICMP Flood, DoS, dll. Serangan ini …

Traffic classification for the detection of anonymous web proxy routing

S Miller, K Curran, T Lunney - International Journal for Information …, 2015 - pure.ulster.ac.uk
There is an increasing need to be able to classify whether an incoming packet is from a
legitimate originating IP address or has been modified through an intermediate proxy or …

Detection of anonymising proxies using machine learning

S Miller, K Curran, T Lunney - … Journal of Digital Crime and Forensics …, 2021 - igi-global.com
Abstract Network Proxies and Virtual Private Networks (VPN) are tools that are used every
day to facilitate various business functions. However, they have gained popularity amongst …

Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses

S Miller, K Curran, T Lunney - … Journal of Digital Crime and Forensics …, 2021 - igi-global.com
The detection of unauthorised users can be problematic for techniques that are available at
present if the nefarious actors are using identity hiding tools such as anonymising proxies or …

Packet filtering for IPV4 protocol using FPGA

SM Keni, S Mande - 2018 Second International Conference on …, 2018 - ieeexplore.ieee.org
Firewall is a key domain of security and a necessity for every organization. The basic
function of firewall is packet filtering. This paper makes use of highly parallelized …

[PDF][PDF] A systematic approach for highly secure framework for virtual firewall

R Tajpuriya, V Gupta, IJ Rajput - International Journal For …, 2017 - academia.edu
Traditional “Physical security measures literally become blind to traffic between virtual
machines” since the virtual network traffic may never leave the physical host hardware. The …

Would an Object Representation Invariant Provide Sufficient State Based Knowledge to Adapt Network Intrusion Detection System Rules With Minimal Impact to …

A Melaragno - 2020 IEEE Intl Conf on Dependable, Autonomic …, 2020 - ieeexplore.ieee.org
This work illustrates experimentally with an implemented system and defined representation
invariant that when the representation invariant is violated security adaptations can be made …

[CITACE][C] Identifying the Use of Anonymising

S Miller, UK Coleraine, K Curran, T Lunney