A firewall policy anomaly detection framework for reliable network security

C Togay, A Kasif, C Catal… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
One of the key challenges in computer networks is network security. For securing the
network, various solutions have been proposed, including network security protocols and …

Security policy recommendation generation

S Krishna, K Kumar, R Mordani, R Popuri… - US Patent …, 2022 - Google Patents
Some embodiments provide a novel method for collecting and reporting attributes of data
flows associated with machines executing on a plurality of host computers to an analysis …

[HTML][HTML] Características de la conectividad a internet en el cantón Pasaje

KG Pincay Romero - Revista Universidad y Sociedad, 2021 - scielo.sld.cu
Con el objetivo de caracterizar la conectividad a Internet en el Cantón Pasaje se desarrolló
una investigación de tipo descriptivo con enfoque cuantitativo fundamentada en los …

Presenting data regarding grouped flows

R Mordani, S Vilayannur, S Nagar, A Patel… - US Patent …, 2023 - Google Patents
Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL
TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL …

Recommendation generation based on selection of selectable elements of visual representation

S Krishna, K Kumar, R Mordani, A Shendure… - US Patent …, 2022 - Google Patents
Some embodiments provide a novel method for collecting and reporting attributes of data
flows associated with machines executing on a plurality of host computers to an analysis …

A systematic study of network firewall and its implementation

R Alsaqour, A Motmi, M Abdelhaq - International Journal of …, 2021 - koreascience.kr
This is an era of technology and with the rapid growth of the Internet, networks are
continuously growing. Companies are shifting from simple to more complex networks. Since …

Ipsec/firewall security policy analysis: A survey

R Khelf, N Ghoualmi-Zine - … on Signal, Image, Vision and their …, 2018 - ieeexplore.ieee.org
As the technology reliance increases, computer networks are getting bigger and larger and
so are threats and attacks. Therefore Network security becomes a major concern during this …

Offloading anomaly detection from server to host

J Jayant, LU Russell, R Lund, AS Tiagi… - US Patent …, 2022 - Google Patents
Some embodiments provide a novel method for collecting and analyzing attributes of data
flows associated with machines executing on a plurality of host computers to detect …

Host-based flow aggregation

J Jayant, LU Russell, L Loi, R Lund… - US Patent 11,398,987, 2022 - Google Patents
Some embodiments provide a novel method for collecting and reporting attributes of data
flows associated with machines executing on a plurality of host computers to an analysis …

Dynamically providing keys to host for flow aggregation

J Jayant, LU Russell, L Loi, R Lund, A Poon - US Patent 11,288,256, 2022 - Google Patents
Some embodiments provide a novel method for collecting and reporting attributes of data
flows associated with machines executing on a plurality of host computers to an analysis …