A Study of Network Security Systems

被引:0
|
作者
Khalil, Ramy K. [1 ]
Zaki, Fayez W. [1 ]
Ashour, Mohamed M. [1 ]
Mohamed, Mohamed A. [1 ]
机构
[1] Univ Mansoura, Fac Engn, Mansoura, Egypt
关键词
Security; firewalls; parallel; policy; management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The three primary goals of network security which are confidentiality, integrity and availability can be achieved by using firewalls. Firewalls provide security by applying a security policy to arriving packets these policy called security rules and also firewalls can perform other functions like Gateway Antivirus, Gateway Monitor Program to monitor the traffic which pass through the firewall and also the firewall can have the responsibility to establish VPN connections. The complexity of these functions can cause significant delays in the processing of packets, resulting in degraded performance, traffic bottlenecks, and ultimately violating Quality of Service constraints. As network capacities continue to increase, the improvement of firewall performance is a main concern. One technique that dramatically reduces required processing is using Network Load Balance Technique. This paper describes how the performance can be effected because of using a Microsoft firewall. in this paper lots of situations and designs will be tested and results will be shown to determine the effect of using firewall in performance. Also in this paper a new technique to increase firewall performance will be discussed and the performance results will be shown.
引用
收藏
页码:204 / 212
页数:9
相关论文
共 50 条
  • [21] Network Security Management Tool for Distribution Systems
    Styczynski, Zbigniew A.
    Heyde, Chris O.
    Buchholz, Bemd M.
    Ruhle, Olaf
    2008 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, VOLS 1-11, 2008, : 2381 - +
  • [22] EUROPEAN REGULATION ON THE SECURITY OF NETWORK AND INFORMATION SYSTEMS
    Szpor, Grazyna
    GEOGRAPHIC INFORMATION SYSTEMS CONFERENCE AND EXHIBITION - GIS ODYSSEY 2016, 2016, : 252 - 260
  • [23] Network Security: Synchronization in Chaotic Communication Systems
    Kartalopoulos, Stamatios V.
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 565 - 570
  • [24] Network security and communication systems in Smart environments
    Dumitrache, Mihail
    Sandu, Ionut-Eugen
    ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2020, 30 (01): : 61 - 70
  • [25] Distributed Intelligent Systems for Network Security Control
    Shili, Mohamed
    Gharsellaoui, Hamza
    Kanzari, Dalel
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 348 - 352
  • [26] Neural network technologies for information systems security
    Avedyan, Eduard
    Galushkin, Alexander
    Pantiukhin, Dmitry
    2014 SEVENTH IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2014, : 54 - 58
  • [27] Achieving Information Security in Network Computing Systems
    Cunsolo, V. D.
    Distefano, S.
    Puliafito, A.
    Scarpa, M. L.
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 71 - 77
  • [28] Intelligent Security and Risk Analysis in Network Systems
    Mohammadian, Masoud
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 825 - 830
  • [29] A Survey on Network Coordinates Systems, Design, and Security
    Donnet, Benoit
    Gueye, Bamba
    Kaafar, Mohamed Ali
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (04): : 488 - 503
  • [30] The role of transitional probability in network security systems
    McMahon, MM
    Sholl, HA
    Lancor, LB
    INTERNATIONAL SOCIETY FOR COMPUTERS AND THEIR APPLICATIONS 10TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 1997, : 308 - 313