Firewall Redundancy Rules Filtering Using Integrity Rules Checking
Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and f...
Main Authors: | Zarina, Dzolkhifli, Wan Nurul Safawati, Wan Manan, Mohd Hafiz, Mohd Hassin, Dhia Syafiqa, Mohd Jaafar |
---|---|
Format: | Article |
Language: | English |
Published: |
American Scientific Publisher
2018
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/19617/ http://umpir.ump.edu.my/id/eprint/19617/ http://umpir.ump.edu.my/id/eprint/19617/ http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf |
Similar Items
-
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015) -
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013) -
Simulated Annealing Based Strategy for Test Redundancy Reduction
by: Kamal Z., Zamli, et al.
Published: (2014) -
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018) -
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)