Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2012, International Journal of Strategic Information Technology and Applications
An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solutions, vulnerabilities may be reduced. The purpose of this paper is to explore how use, misuse, positive and negative, obstacle, and abuse testing cases of firewalls have broadened the security policies that mitigate or prevent threats in a cloud environment.
IRJCS:: AM Publications,India, 2024
In the ever-evolving landscape of digital infrastructure, the adoption of cloud computing has ushered in unparalleled opportunities for innovation but has also introduced complex challenges in securing sensitive data. This research, titled "Beyond the Firewall: Understanding and Mitigating Cloud Security Challenges," embarks on a comprehensive exploration of the multifaceted dimensions surrounding cloud security. The study delves into the intricacies of cloud security, transcending traditional boundaries set by firewalls. From elucidating the dynamics of shared responsibility models to dissecting the nuances of identity and access management, the research unravels the complexities inherent in safeguarding data within the expansive digital cosmos. It addresses elusive threats like data breaches and underscores the critical importance of adaptive strategies to navigate the ever-changing threat landscape. This research goes beyond theoretical discourse, offering actionable insights for organizations seeking to fortify their cyber defenses. It emphasizes the need for a paradigm shift in understanding security challenges in the cloud era and advocates for a proactive approach to mitigate potential risks. By illuminating the path "Beyond the Firewall," this study aims to empower stakeholders with practical knowledge, enabling them to establish robust security frameworks that resonate with the dynamic nature of modern digital ecosystems. Join us on this expedition into the heart of cloud security challenges, as we decipher the complexities and chart a course towards a more resilient and secure digital future.
2008
Abstract Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall directly depends on the quality of its policy (ie, configuration), ensuring the correctness of security policies is important and yet difficult. To help ensure the correctness of a firewall policy, we propose a systematic structural testing approach for firewall policies.
2003
Firewalls protect a trusted network from an untrusted network by filtering traffic according to a specified security policy. A diverse set of firewalls is being used today. As it is infeasible to examine and test each firewall for all possible potential problems, a taxonomy is needed to understand firewall vulnerabilities in the context of firewall operations. This paper describes a novel methodology for analyzing vulnerabilities in Internet firewalls.
ESP Journal of Engineering & Technology Advancements , 2022
IT is evolving at an incredible pace, and this has greatly changed the perimeter of the network that is distributed. As such, the traditional concepts of security are not enough. Today, port-based firewalls have become virtually useless because, as more and more businesses use analytics, cloud computing, and other forms of automation to speed up their progress in creating new products and services to meet the public’s demand, smart cyber threats are being created to exploit the gaps left behind by traditional security tools. To counter such challenges, there has been the development of advanced firewalls referred to as the next generation firewalls (NGFWs) and Web Applications firewalls (WAFWs). The aim of this paper is to describe how NGFWs developed and merged with cloud solutions, focusing on additional capabilities like DPI, application filtering, and implementation of AI. Pursuant to that, this research compares AI-based firewalls as it assesses their performance in meeting current cyber threats using sophisticated methods like machine learning and deep learning. The paper focuses on the cloud applicability of AI-based firewalls and examines their capacity to deliver constant performance in dynamic networks. This research does not provide theoretical simulation but shows the actual performance of different AI-based firewall architectures, their ability to detect threats, false positives, and time consumption. The paper also looks into the issues related to the use of these advanced firewalls in cloud environments and discusses possible drawbacks and modifications that may be done. Therefore, this research offers a literature review of the NGFWs and WAFWs and their applicability in defending the current complex enterprise environments, including the use of cloud services. The findings add to the current knowledge of cyber security management, suggesting the potential of AI to be a key enabler of detection, growth, and resource management within the cloud security paradigm.
Even after the adoption of network security policies and practices, unauthorized intrusion occurs. It is an attack in which attacker gets access to the system by means of different hacking and cracking techniques. Firewall is hardware-software based network security system that uses rules to control incoming and outgoing network packet. A firewall controls access to the resources of a network through a positive control model. There are various traditional firewalls like Packet Filters, Application-level Gateways and Circuit-level Gateways which has certain pros and cons. To overcome disadvantages the traditional firewall, next generation firewalls are introduced. This paper gives the empirical study of tradition firewalls, and its evolution to Next Generation firewall like NGFW, UTM, Threat focused its features and advantages. Manisha Patil | Savita Mohurle"The Empirical Study of the Evolution of the Next Generation Firewalls" Published in International Journal of Trend in...
Lecture Notes in Computer Science, 2014
International Journal of Internet Technology and Secured Transactions, 2018
Fundamentos de Administracion - Stephen P Robbins
The PhotoHistorian: The Journal of the Royal Photographic Society Historical Group, 2024
Red Slip in Central and Western Mediterranean between the 9 th and the 6 th century BC Tracking Lasting Features, Local Peculiarities and Technological Innovations (Quaderni di archeologia fenicio-punica IX, pp. 1-22, 2024
Vicatim n.2 , 2022
casos de estudio, 2020
RumeliDE Dil ve Edebiyat Araştırmaları Dergisi, 2022
Journal of Tropical Pediatrics, 2010
Dalton Trans., 2014
Electronic Journal of Differential Equations, 2020
2012 IEEE Conference on Computational Intelligence and Games (CIG), 2012