Design and Implementation of a Hacker Detection Scheme: A Network Security Measure in Heterogeneous WSN

Author(s):  
B. Srinivasa Rao ◽  
P. Premchand
2019 ◽  
Vol 66 (6) ◽  
pp. 943-947 ◽  
Author(s):  
Carlo Condo ◽  
Seyyed Ali Hashemi ◽  
Arash Ardakani ◽  
Furkan Ercan ◽  
Warren J. Gross

2013 ◽  
Vol 433-435 ◽  
pp. 1597-1602
Author(s):  
Jian Shi ◽  
Song Deng ◽  
Wei Min Lin ◽  
Tao Zhang ◽  
Yuan Yuan Ma ◽  
...  

The firewall is one of the most important network security facility and is widely used as a base infrastructure in a large enterprise network. When policy changes, the administrator must find all the potential conflicts between existing policies to ensure network security. That's a waste of time and energy. Proceeding from the demands, this paper analyzes key points and difficulties in the design process for the tools, applies mature algorithm of policy conflict detection, and finally proposes a flexible and scalable design. The prototype system proves that the tool does effectively detect all conflicts in policy set, and in the form of reports for the administrator.


2014 ◽  
Vol 644-650 ◽  
pp. 3283-3286 ◽  
Author(s):  
Shun Qing Wang ◽  
Hai Yan Chen

Being important in the field of network security, it is essential to study the firewall technology that has been an indispensable part of computer networks. This paper describes a new design and implementation of ASIC firewall architecture based on the state detection technology. Implementation and measurements in a real network show that the proposed system can provide high performance with reliability, flexibility, and security.


Sign in / Sign up

Export Citation Format

Share Document