2021
DOI: 10.23919/jcn.2021.000011
|View full text |Cite
|
Sign up to set email alerts
|

Traffic and overhead analysis of applied pre-filtering ACL firewall on HPC service network

Abstract: Article that has been accepted for inclusion in a future issue of a journal. Content is final as presented, with the exception of pagination.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…He et al [1] focused on anomaly detection techniques, particularly in system log analysis, emphasizing the importance of analyzing system logs for identifying potential security threats. Lee et al [4] conducted a detailed analysis of firewall logs, highlighting the traffic and overhead analysis of pre-filtering ACL firewall on HPC service networks. As-Suhbani and Khamitkar [5] and Esmaeil et al [7] explored machine-learning algorithms for the classification of firewall logs and for discovering anomalous rules in firewall logs, respectively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…He et al [1] focused on anomaly detection techniques, particularly in system log analysis, emphasizing the importance of analyzing system logs for identifying potential security threats. Lee et al [4] conducted a detailed analysis of firewall logs, highlighting the traffic and overhead analysis of pre-filtering ACL firewall on HPC service networks. As-Suhbani and Khamitkar [5] and Esmaeil et al [7] explored machine-learning algorithms for the classification of firewall logs and for discovering anomalous rules in firewall logs, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…An abnormal detection event is considered a potential threat and processed as a DROP policy object to prevent attack attempts when it exceeds a predetermined threshold [3]. Tightening these thresholds enhances security and increases the firewall load [4]. Consequently, the risk of incorrectly adding a DROP policy object increases as attack attempts become more frequent.…”
Section: Introductionmentioning
confidence: 99%
“…An arbitrary ordering of the neighbors of vertex i represents a gene i, g (i) , with size at most d i . A chromosome is a collection of n genes: g (1) , g (2) , • • • , g (n) , each corresponding to an ordering for a particular vertex. Table I portrays an arbitrary chromosome for the graph given in Fig 1(a), where row i of the matrix corresponds to gene g (i) .…”
Section: A Genes Chromosomes and Populationmentioning
confidence: 99%
“…W ITH the growth of computer networks in recent years, various problems have received significant attention. On the one hand, the design of interconnection networks is pivotal in several domains, such as high-performance computing (HPC) systems [1], [2]. The overall network performance is determined by the topology used in the interconnection network as well as the routing scheme [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation