Developing the Role of Firewalls in Enhancing Web Security for Wireless Networks DOI

Ritushree Narayan,

N. V. Balaji,

G Kalanandhini

и другие.

Опубликована: Дек. 29, 2023

Firewalls play a critical role in controlling incoming and outgoing community site visitors shielding wireless network from malicious assaults. This technical summary focuses on the development of firewalls as way to beautify internet safety for Wi-Fi networks. Contemporary networks are increasingly more vulnerable cyber-attacks. one simplest strategies safety, able restricting among or net. They also can be used come across perceive pastime. The has improved at fast pace current years. New functions along with Intrusion Detection Prevention systems (IDS/IPS), URL filtering, virus scanning, user authentication, application layer have vastly advanced effectiveness firewalls. Advanced such deploy Rector Reactive tracking (IRM), get right entry manage (NAC) getting detect suspicious requests put into effect coverage. NAC may both control admission resources, respond visitors. enhanced protection supplied by is useful home employer Via implementing those capabilities, organizations lessen danger cyberattacks guard their resources.

Язык: Английский

Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification DOI Creative Commons

S. Pradeep,

Yogesh Kumar Sharma, Umesh Kumar Lilhore

и другие.

Scientific Reports, Год журнала: 2023, Номер 13(1)

Опубликована: Окт. 13, 2023

Software-defined networking (SDN) has significantly transformed the field of network management through consolidation control and provision enhanced adaptability. However, this paradigm shift concurrently presented novel security concerns. The preservation service path integrity holds significant importance within SDN environments due to potential for malevolent entities exploit flows, resulting in a range breaches. This research paper introduces model called "EnsureS", which aims enhance by proposing an efficient secure validation approach. proposed approach utilizes Lightweight Service Path Validation using Batch Hashing Tag Verification, focusing on improving validation's efficiency environments. EnsureS system two primary techniques order validate pathways efficiently. Firstly, method batch hashing minimize computational overhead. algorithm enhances performance aggregating packets batches rather than independently; process takes place each one pathway. Additionally, implementation tag verification enables devices efficiently verify authenticity leveraging pre-established trust relationships. provides streamlined effective validating paths integrating these methodologies. In assess efficacy Proposed EnsureS, comprehensive series investigations were conducted simulated circumstance. was then compared that established methods. findings our study indicate solution effectively minimizes overhead without compromising standards. successfully reduces impact different types attacks, such as route alteration packet spoofing, increasing networks' general integrity.

Язык: Английский

Процитировано

16

Exploring the landscape of software defined networking: A comprehensive survey of applications, challenges, and future directions DOI

Ahmed Nadhum,

Ahmed Al-Saadi

AIP conference proceedings, Год журнала: 2025, Номер 3224, С. 030018 - 030018

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Detection and Analysis of Active Attacks using Honeypot DOI Open Access
Waqas Ahmad,

Muhammad Arsalan Raza,

Sabreena Nawaz

и другие.

International Journal of Computer Applications, Год журнала: 2023, Номер 184(50), С. 27 - 31

Опубликована: Март 22, 2023

Honeypots are computer systems specifically deployed to deceive attackers so that they consider them legitimate computers.Honeypots actually a trap trick the we can learn about their behavior and attack methods use.Security experts collect all relevant information techniques take firm actions strengthen security measures.Although another technique is also being used which Intrusion Detection Prevention System (IDPS), but it generates false positives negatives, limitation of IDPS.Therefore, know behavior, methods, techniques, signatures an attacker, Dionaea honeypot system regarding cyber-attacks, proving more useful way rather than previous traditional methods.Attacks were captured by software reveal source IP addresses target host became victim attacks.

Язык: Английский

Процитировано

8

Organizational information security threats: Status and challenges DOI Creative Commons

B. Akello

World Journal of Advanced Engineering Technology and Sciences, Год журнала: 2024, Номер 11(1), С. 148 - 162

Опубликована: Фев. 11, 2024

Organizational information security is a critical concern in today’s interconnected and data-driven world. With the increasing frequency sophistication of cyber threats, organizations face significant risks to confidentiality, integrity, availability their sensitive information. This paper provides an overview key aspects challenges related organizational security. It highlights importance implementing robust measures, such as firewalls, intrusion detection systems, encryption technologies, secure coding practices, protect against external threats. also demonstrates need for continuous monitoring, threat intelligence sharing, incident response capabilities detect respond incidents effectively. survey shows user awareness, training, adherence policies procedures. In addition, significance establishing security-centric culture within mitigate risk insider threats promote strong posture discussed. The evolving landscape, including associated with advanced persistent zero-day vulnerabilities, emerging technologies IoT AI are highlighted, together ongoing research innovation address these enhance effectiveness preventive measures.

Язык: Английский

Процитировано

2

An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets DOI Creative Commons
Jamal Khudair Madhloom,

Zainab Hammoodi Noori,

Sif K. Ebis

и другие.

Computers, Год журнала: 2023, Номер 12(10), С. 202 - 202

Опубликована: Окт. 8, 2023

Due to the Internet’s explosive growth, network security is now a major concern; as result, tracking traffic essential for variety of uses, including improving system efficiency, fixing bugs in network, and keeping sensitive data secure. Firewalls are crucial component enterprise-wide architectures because they protect individual networks from intrusion. The efficiency firewall can be negatively impacted by issues with its design, configuration, monitoring, administration. Recent methods do not have rigor manage vagueness that comes filtering packets exterior. Knowledge representation reasoning two areas where fuzzy Petri nets (FPNs) receive extensive usage modeling tool. Despite their widespread success, FPNs’ limitations engineering field stem fact it difficult represent different kinds uncertainty. This article details construction novel packet-filtering model addresses current FPN-based methods. primary contribution employ Simplified Neutrosophic (SNPNs) tool discrete event systems area packet characterized imprecise knowledge. Because SNPNs’ symbolic ability, filtration quickly easily established, examined, enhanced, maintained. Based on idea ambiguity packet’s movement described if–then production rules realized truth-membership function, indeterminacy-membership falsity-membership functional, we adopt neutrosophic logic modelling PN transition objects. In addition, simulate dynamic behavior light inherent presenting two-level method improve ranking list. Results experiments local back up efficacy proposed illustrate how increase firewall’s susceptibility threats posed traffic.

Язык: Английский

Процитировано

5

Exploring SDN Based Firewall and NAPT: A Comparative Analysis with Iptables and OVS in Mininet DOI

Md Fahad Monir,

Azwad Fawad Hasan

Lecture notes on data engineering and communications technologies, Год журнала: 2024, Номер unknown, С. 436 - 447

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

0

Developing the Role of Firewalls in Enhancing Web Security for Wireless Networks DOI

Ritushree Narayan,

N. V. Balaji,

G Kalanandhini

и другие.

Опубликована: Дек. 29, 2023

Firewalls play a critical role in controlling incoming and outgoing community site visitors shielding wireless network from malicious assaults. This technical summary focuses on the development of firewalls as way to beautify internet safety for Wi-Fi networks. Contemporary networks are increasingly more vulnerable cyber-attacks. one simplest strategies safety, able restricting among or net. They also can be used come across perceive pastime. The has improved at fast pace current years. New functions along with Intrusion Detection Prevention systems (IDS/IPS), URL filtering, virus scanning, user authentication, application layer have vastly advanced effectiveness firewalls. Advanced such deploy Rector Reactive tracking (IRM), get right entry manage (NAC) getting detect suspicious requests put into effect coverage. NAC may both control admission resources, respond visitors. enhanced protection supplied by is useful home employer Via implementing those capabilities, organizations lessen danger cyberattacks guard their resources.

Язык: Английский

Процитировано

0