2019
DOI: 10.5120/ijca2019919416
|View full text |Cite
|
Sign up to set email alerts
|

Building New Generation Firewall Including Artificial Intelligence

Abstract: The expanding complexity of networks and the need to make them increasingly open due to the growing emphasis on and attractiveness of the Internet as a mode for business transactions, imply that networks are exposed to increasingly more attacks, both from without and from within.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…Initial security layer of data protection method is firewalls. Firewalls are designed to protect data from usage of unauthorised sources [11]. These firewalls work as an intermediary between public and personal internet globally.…”
Section: Resultsmentioning
confidence: 99%
“…Initial security layer of data protection method is firewalls. Firewalls are designed to protect data from usage of unauthorised sources [11]. These firewalls work as an intermediary between public and personal internet globally.…”
Section: Resultsmentioning
confidence: 99%
“…A typical IP address looks like this: 216.27.61.137. Such as, if a single IP address just outside of the business reads an unusually large quantity of data from such a host, the firewall may block all communication from and to that address [58]. Protocols It is the pre-defined means by which someone who wants to use a facility communicates with that facility.…”
Section: B Firewall Configurationmentioning
confidence: 99%
“…Protocols It is the pre-defined means by which someone who wants to use a facility communicates with that facility. The "someone" might be a person, although it is most typically a piece of code or software [58]. A few typical protocols for which investigators can configure firewall filtering include: IP-known as Internet Protocol.…”
Section: B Firewall Configurationmentioning
confidence: 99%
See 2 more Smart Citations