2003
DOI: 10.1016/s0167-4048(03)00310-9
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of vulnerabilities in Internet firewalls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
41
0
2

Year Published

2005
2005
2017
2017

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(44 citation statements)
references
References 9 publications
1
41
0
2
Order By: Relevance
“…The study of vulnerability has a long history, having been used to study power distribution systems [13], the Internet [14] and transportation systems [15] to just name a few. Because of differences between the various settings, vulnerability does not yet have a commonly accepted definition.…”
Section: Vulnerability Factors Of Rail Transit Systemmentioning
confidence: 99%
“…The study of vulnerability has a long history, having been used to study power distribution systems [13], the Internet [14] and transportation systems [15] to just name a few. Because of differences between the various settings, vulnerability does not yet have a commonly accepted definition.…”
Section: Vulnerability Factors Of Rail Transit Systemmentioning
confidence: 99%
“…The analysis and verification methods of firewall policies have been presented in [11], [23], [24], and [28], and the testing of firewall policies was studied in [19]. Firewall vulnerabilities were discussed and classified in [10] and [21] with focus on firewall software. However, none of these works focuses on redundancy removal.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, since security solutions often have been the target of malicious actions (e.g., anti-virus software [5], intrusion detection systems [6] or firewalls [7], [8], [9], [10]) as part of a wider scale attack, SIEM systems should be built/deployed under the assumption that this sort of actions will eventually occur. In this paper, we will focus on the protection of the core facility components from outside attacks, improving the security and dependability of such essential processing.…”
Section: Introductionmentioning
confidence: 99%