Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
The proposed firewall rule matching algorithm based on our designed hash table function is able to achieve far better speed than other search algorithms. Additionally, our hash table-based algorithm shows a constant execution time regardless the number of firewall rules.
Jul 31, 2018 · This paper proposes an advanced firewall rules matching algorithm with designed hash table function. The proposed firewall rule matching ...
Using the hash function methodology, this project aims to define firewall rule matching algorithm that perform in shortest worst-case time complexity in ...
People also ask
The proposed firewall rule matching algorithm based on our designed hash table function is able to achieve far better speed than other search algorithms.
Request PDF | On Jul 1, 2018, Elvira Febiani and others published An Advanced Firewall Rule Matching Algorithm | Find, read and cite all the research you ...
This paper presents an innovative two-stage algorithm to solve the firewall rule ordering optimization problem.
Export via OAI-PMH Interface in XML Formats · Export to Different Formats.
Thus, we conclude that the GEM algorithm is an excellent, practical, algorithm for firewall packet matching: Its matching speed is far better than the naive ...
Missing: Advanced | Show results with:Advanced
This paper proposes an algorithm that is designed for divergence resolution and gives good network performance by reducing the packet matching time of the ...
Missing: Advanced | Show results with:Advanced
Jun 1, 2022 · The simplest algorithm for ACL processing iterates over successive elements of the list and finds the first rule that matches the given packet.
Missing: Advanced | Show results with:Advanced