Optimizing TCP forwarder performance
IEEE/ACM Transactions on Networking (TON)
An evaluation scheme of adaptive configuration techniques
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
IPsec-based end-to-end VPN deployment over UMTS
Computer Communications
Hi-index | 0.24 |
Firewalls are a well-established and integral part of network security. However, in most situations firewalls are configured according to a set of static rules based upon a policy. To date, development in firewall architectures which can react to attacks such as those demonstrated by the Nimda virus are very limited. Yet it is essential that firewalls are able to cope with and react to such attacks. The idea of a firewall changing or adapting its rules in the face of adverse situations is proposed and demonstrated by way of a prototype in this paper. This new concept of rule adaptation permits security management beyond conventional stateful connection tracking, and incorporates the overall system state as well as the effects of multiple connections.