Anais Do XVI Simpósio Brasileiro De Segurança Da Informação E De Sistemas Computacionais (SBSeg 2016) 2016
DOI: 10.5753/sbseg.2016.19318
|View full text |Cite
|
Sign up to set email alerts
|

An Architecture for Self-adaptive Distributed Firewall

Abstract: The notion of secure perimeter given by border firewalls ignores the possibility of attacks originating from inside the network. Although distributed firewalls allow the protection of individual hosts, the provided services might still be susceptible to attacks, as firewalls usually do not analyze application protocols. In this way, software vulnerabilities may be exploited until the problem has been fixed. From vulnerability discovery to the application of patches there is an exposure window that should be re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The studies in [3], [4] examined the effects of distributed firewalls. Although previous studies have explored the impact of the added a new improvements and functionalities to traditional firewalls.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The studies in [3], [4] examined the effects of distributed firewalls. Although previous studies have explored the impact of the added a new improvements and functionalities to traditional firewalls.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, traditional firewalls implemented at the network boundary are no longer efficient in this context. Instead, centralized firewalls, positioned between the internal network of an establishment and the internet, are replaced by distributed firewalls [4]. These distributed firewalls define security policies using a specific language in a centralized manner, to be implemented at various points within the network.…”
Section: Introductionmentioning
confidence: 99%