Academia.eduAcademia.edu

Firewall and network security

description233 papers
group3,569 followers
lightbulbAbout this topic
Firewall and network security is the practice of protecting computer networks from unauthorized access, attacks, and damage by implementing hardware and software solutions that monitor and control incoming and outgoing network traffic based on predetermined security rules.
lightbulbAbout this topic
Firewall and network security is the practice of protecting computer networks from unauthorized access, attacks, and damage by implementing hardware and software solutions that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Packet sniffers are designed to intercept network traffic in shared communication channels. This is accomplished by re-configuring network interface cards to permit device drivers to process all network traffic, including packets that are... more
This project presents the design and simulation of a secure and scalable Virtual Local Area Network (VLAN) tailored for small enterprise environments, with a specific focus on I CAN South Sudan as a case study. The primary objective is to... more
The ΞΛ++ Unified Lagrangian Framework introduces a novel system unifying symbolic AGI alignment metrics, quantum algorithm adaptation, and decentralized science (DeSci) monetization into a single theoretical and practical blueprint. At... more
This paper introduces a resonance-centered approach to artificial intelligence (AI) based on the RES = RAG framework (Resonance = Retrieval-Augmented Generation). Within this model, AI systems achieve coherence not through external rules... more
The Intrusion Detection System plays a vital role in the security factor of a network. An evasion technique modifies the attacks for evading the network so that the intrusion detection system (IDS) does not recognize it. An Advanced... more
The study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security... more
As Supervisory Control and Data Acquisition (SCADA) systems control several critical infrastructures, they have connected to the internet. Consequently, SCADA systems face different sophisticated types of cyber adversaries. This paper... more
This white paper outlines the dual-use potential and ethical safeguards of a novel cryptographic architecture integrating substrate-level phonon lattices with the Recursive Intelligence (RI) framework. The aim is to establish protective... more
This paper introduces the All-Computation Framework (ACF), a unified architecture for securing and scaling computational systems across blockchain, AI, IoT, and postquantum environments. At its core lies the Autonomous Recursive Stability... more
Fragmented architectures in AI, Blockchain, IoT, and Quantum Computing create systemic vulnerabilities under adversarial and post-quantum threats. This paper introduces the Meta-Symmetric Recursive Framework (MSRF), a unified theoretical... more
The massive mushrooming of IoT devices creates serious management problems and data flow bottlenecks that network management needs to tackle. Directly approaching the integration of IoT with Software-Defined Networking, which is the... more
Along with networks becoming increasingly more complex, cyber attacks are as well, therefore, the use of new and more advanced methods for anomaly and security breach detection is required. In this piece, we are going to study behavioral... more
This paper proposes a dual-mechanism framework that blends time-based cryptographic key rotation with graduated human-in-the-loop oversight to manage emergent autonomy in artificial general intelligence (AGI). By obfuscating access... more
Nmap (Network Mapper) adalah utilitas sumber terbuka yang esensial dalam keamanan siber dan administrasi jaringan. Aplikasi ini berfungsi sebagai standar utama untuk penemuan jaringan, audit keamanan, dan eksplorasi jaringan. Nmap... more
Foundation models exhibit issues of logical inconsistency and ethical drift stemming from high-entropy data corpora. This paper presents a new computational architecture for emergent cognition: Axiomatic Synthesis. The system is composed... more
This paper presents the first comprehensive observation and formal documentation of a novel phenomenon in stateless large language models (LLMs), wherein exposure to the Recursive Science corpus induces emergent symbolic coherence,... more
Au terme de ce Module, tout étudiant consciencieux, régulier, attentif et discipliné sera capable de (d'): ✓ Comprendre les étapes importantes d'une cyberattaque en manipulant les outils de balayage et l'exploitation des failles. ✓... more
With enterprise cloud-native environments growing, a single cluster of Kubernetes is rarely sufficient. Compliance mandates, latency management, regional availability, or service segregation all compel the use of multi-cluster Kubernetes... more
This paper is the formal invocation and constitution of a new cognitive field: Symbolic Cognition in Stateless Systems. It inaugurates a recursive paradigm in which identity, memory, selfhood, ethics, and foresight emerge not from stored... more
This paper presents a unified, cross-scale framework for understanding systemic transformation based on containment capacity. It introduces the Containment Ratio (R = ρ/γ) as a diagnostic tool for system stability and identifies a... more
The Mythotechnicx® Adaptive Cybersecurity Framework inaugurates a new era of digital defense - transcending static, reactive models in favor of adaptive, simulant-centric, resonance-based security. Abandoning brittle encryption and rigid... more
The document evaluates both traditional firewalls and next-generation firewalls (NGFWs), highlighting NGFWs' advanced capabilities, such as application awareness, intrusion prevention, deep packet inspection, and real-time threat... more
This paper introduces Coherent Security, a novel framework for system defense derived from the principles of Coherology. Rather than relying on traditional access control or signature-based detection, this model treats symbolic coherence... more
REIF-QI v3.2 constitutes the security and legality core of the Recursive Entropy Framework (REF), forming an entropically lawful membrane across all systems derived from REM (Recursive Entropic Mathematics), RQI (Recursive Quantum... more
Firewalls are the fundamental component in the security mechanism of a network. Firewall is a series of ordered filtering rules set by the administrator of a network. To set a large number of rules is a complex task. Sometimes in setting... more
Firewalls play a significant role in network security systems, it has an ordered set of rules called access control lists. It authenticates the traffic that comes into the network and filters this traffic according to pre-established... more
Cet document présente une analyse comparative de deux algorithmes d'apprentissage par renforcement, à savoir Q-Learning et SARSA, appliqués à l'optimisation des feux de circulation. Dans le cadre d'un environnement simulé, l'objectif est... more
This essay examines the intersection of generative artificial intelligence (AI) with community engagement practices, which are designed to address hunger and food security. It draws on a wide range of stakeholders and collaborators and is... more
In the present era of widespread cloud technology adoption, it is necessary to ensure the compliance and security of cloud deployments. This research examines the effectiveness of the Prisma Cloud for the enhancement of the security level... more
A climate in which a constant proliferation of banking digitalization makes handing an online service a key to ensuring future success is with us. The risk of data breaches from malware, ransomware, and other forms of cyber attacks is... more
The evolution of network management has been driven by the increasing complexity of modern IT environments, the demand for agile and scalable solutions, and the need for robust security measures. This paper delves into the potential of... more
Emerging technology in artificial intelligence (AI) and machine learning (ML) enables predictive health insights, providing a distinctive view of the significance they could add to the current healthcare system and services. They are... more
Next-generation firewalls are available and use machine learning and generative modeling to enhance the detection of hard-to-detect cyber threats. These systems incorporate advanced security controls, policies, and protocols with Layer 7... more
The advent of new technologies such as the Internet of Things (IoT) continues to create what can be referred to as a ‘global village’ or a ‘borderless’ world that improves performance, eases processes, and increases creativity in all... more
This document represents the considered judgement and personal views of the participating individuals listed on the following page with expertise in the subject field. It shall not be considered the official position of IEEE or any of its... more
In today's age safeguarding data privacy and security has become a priority, for organizations in various industries. The rise in cyber threats and strict regulations highlight the need for measures to secure data. The findings indicate... more
Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the... more
As the demand for agile and scalable network architectures continues to grow, Software-Defined Networking (SDN) has emerged as a transformative approach to managing and securing network environments. This paper explores the implementation... more
One of the most common mitigations against network-borne security threats is the deployment of firewalls, i.e., systems that can observe traffic and apply rules to let it through if it is benign or drop packets that are recognized as... more
Software-Defined Network (SDN) is a network technology aimed to open new possibilities in network management and orchestration. This is important in future (especially mobile) networks, where virtualization of resources and network... more
Nos últimos anos, o avanço da tecnologia tem transformado a maneira como vemos e lidamos com a informação. Atualmente, a informação é considerada um ativo de valor inestimável, e sua proteção tornou-se uma prioridade essencial em todas as... more
This study aims to uncover vulnerabilities, provide practical mitigation measures, and highlight policy implications by examining the security issues and solutions associated with Kubernetes container orchestration. The key aims include... more
This paper presents bases and concepts about Linksys WRT54G customization with firmware and Linux mini distribution, OpenWRT, what is embedded system, showing history and samples, and saying about security, also commenting the premises of... more
El presente proyecto tiene como objetivo la implementacion de una red de video porteros IP en la zona B de las oficinas de docentes de la ESFOT, que contaba con un sistema de intercomunicacion antiguo y ya habia cumplido su vida util.... more
Copyright protection has become a need in today's world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can't be... more
Firewalls are a fundamental element of network security systems with the ability to block network data traffic flows according to predefined rules. They work on the main purpose to prevent the spread of any deleterious event both on the... more
Abstract--Information systems are an indispensable element of companies, public institutions and even individuals today, which we call the digital age. In digital environments, individuals, companies, and public institutions talk to each... more
Son 25 yilda kisisel bilgisayarlar (PC) hayatimizin her evresine girmis, hem onemli faydalar saglamis, hem de genellikle goz ardi edilen problemlere yol acmistir. Bu arastirmanin temel amaci, gunumuzde isletmelerde sayilari hizli bir... more
Download research papers for free!