A Study of Network Security Systems

被引:0
|
作者
Khalil, Ramy K. [1 ]
Zaki, Fayez W. [1 ]
Ashour, Mohamed M. [1 ]
Mohamed, Mohamed A. [1 ]
机构
[1] Univ Mansoura, Fac Engn, Mansoura, Egypt
关键词
Security; firewalls; parallel; policy; management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The three primary goals of network security which are confidentiality, integrity and availability can be achieved by using firewalls. Firewalls provide security by applying a security policy to arriving packets these policy called security rules and also firewalls can perform other functions like Gateway Antivirus, Gateway Monitor Program to monitor the traffic which pass through the firewall and also the firewall can have the responsibility to establish VPN connections. The complexity of these functions can cause significant delays in the processing of packets, resulting in degraded performance, traffic bottlenecks, and ultimately violating Quality of Service constraints. As network capacities continue to increase, the improvement of firewall performance is a main concern. One technique that dramatically reduces required processing is using Network Load Balance Technique. This paper describes how the performance can be effected because of using a Microsoft firewall. in this paper lots of situations and designs will be tested and results will be shown to determine the effect of using firewall in performance. Also in this paper a new technique to increase firewall performance will be discussed and the performance results will be shown.
引用
收藏
页码:204 / 212
页数:9
相关论文
共 50 条
  • [31] Process query systems for network security monitoring
    Berk, V
    Fox, N
    Sensors, and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Security and Homeland Defense IV, Pts 1 and 2, 2005, 5778 : 520 - 530
  • [32] STUDY ON THE IMPLEMENTATION OF PROTOCOLS FOR PROVIDING SECURITY IN AVERAGE VANET INTERVEHICULARY NETWORK COMMUNICATION SYSTEMS
    Alexandrescu, R. V.
    Surugiu, Maria Claudia
    Petrescu, I.
    PROCEEDINGS OF THE 2015 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2015, : WW1 - WW6
  • [33] A study on network security monitoring for the hybrid classification-based intrusion prevention systems
    Rodas, Oscar
    To, Marco Antonio
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (02) : 115 - 125
  • [34] The Study on Computer Network Security and Precaution
    Sun Xiaoling
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1695 - 1698
  • [35] Study on Strategies of Campus Network Security
    Xu Zhao
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 1956 - 1959
  • [36] Campus Network Security Model Study
    Zhang Yong-ku
    Song Li-ren
    FOURTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2011): COMPUTER VISION AND IMAGE ANALYSIS: PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2012, 8350
  • [37] A systematic mapping study on security for systems of systems
    Olivero, Miguel Angel
    Bertolino, Antonia
    Dominguez-Mayo, Francisco Jose
    Escalona, Maria Jose
    Matteucci, Ilaria
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 787 - 817
  • [38] A systematic mapping study on security for systems of systems
    Miguel Angel Olivero
    Antonia Bertolino
    Francisco José Dominguez-Mayo
    María José Escalona
    Ilaria Matteucci
    International Journal of Information Security, 2024, 23 : 787 - 817
  • [39] Study on the Evaluation Model for Network Security
    Li, Jian Hong
    Li, Guang Zhen
    EQUIPMENT MANUFACTURING TECHNOLOGY AND AUTOMATION, PTS 1-3, 2011, 317-319 : 1745 - 1748
  • [40] Study on Security of Next Generation Network
    Long Zhang
    Kai Zhao
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 538 - +