System insecurity–firewalls

MS Desai, TC Richards… - Information management & …, 2002 - emerald.com
The firewall is normally an intermediate system between the secure internal networks and
the less secure external networks. It is intended to keep corporate systems safe from …

Designing an integrated architecture for network content security gateways

YD Lin, CW Jan, PC Lin, YC Lai - Computer, 2006 - ieeexplore.ieee.org
Installing multiple network security products to detect and block viruses, spam, and other
intrusions introduces substantial overhead in interprocess communications and kernel/user …

[PDF][PDF] Firewall-Architekturen für Multimedia-Applikationen

U Roedig - 2002 - tuprints.ulb.tu-darmstadt.de
In der vorliegenden Arbeit" Firewall-Architekturen für Multimedia-Applikationen" werden
Lösungen entwickelt und diskutiert, die es ermöglichen, Multimedia-Applikationen in …

IP-Telefonie und Firewalls, Probleme und Lösungen

U Roedig, R Ackermann, R Steinmetz - 2001 - degruyter.com
ZUSAMMENFASSUNG Im Rahmen einer umfassenden Security-Policy stellen Firewall-
Systeme eine wichtige Maßnahme zum Schutz eines privaten Netzes vor Angriffen aus dem …

Performance modelling and evaluation of firewall architectures for multimedia applications

U Roedig, J Schmitt - International Conference on Research in …, 2004 - Springer
Firewalls are a well-established security mechanism to restrict the traffic exchanged
between networks to a certain subset of users and applications. In order to cope with new …

[PDF][PDF] Firewall technology

G Hallingstad, R Windvik, MG Jaatun - 2002 - cds.cern.ch
Although the study of firewalls by now has evolved into a mature field, documentation and
publications are still rife with ambiguities with respect to the terms used. This document …

Multimedia and firewalls: a performance perspective

U Roedig, J Schmitt - Multimedia Systems, 2005 - Springer
Firewalls are a well-established security mechanism to restrict the traffic exchanged
between networks to a certain subset of users and applications. In order to cope with new …

A novel network processor for security applications in high‐speed data networks

KG Vlachos - Bell Labs technical journal, 2003 - Wiley Online Library
This paper describes the programmable protocol processor (PRO3) architecture, which is
capable of supporting advanced security services over high‐speed networks. Security …

[PDF][PDF] Integrating and benchmarking security gateway with open source firewall, VPN, and IDS

YD Lin, ST Yu, HY Wei - Citeseer
Abstract─ Network security has become a critical issue for enterprises. In this work, we first
demonstrate how to build a security gateway capable of firewall, virtual private network …

[NAVOD][C] 基于自适应蚁群聚类的入侵检测

杨照峰, 樊爱京, 樊爱宛 - 计算机工程与应用, 2011