|
|
|
Fahad M. Alotaibi and Vassilios G. Vassilakis
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand...
ver más
|
|
|
|
|
|
|
Jamal Khudair Madhloom, Zainab Hammoodi Noori, Sif K. Ebis, Oday A. Hassen and Saad M. Darwish
Due to the Internet?s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive data secur...
ver más
|
|
|
|
|
|
|
Sachin Sharma and Avishek Nag
The emergence of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a centralized, programmable control plane that is decoupled from their data pl...
ver más
|
|
|
|
|
|
|
Chun-Liang Lee, Guan-Yu Lin and Yaw-Chung Chen
To support advanced network services, Internet routers must perform packet classification based on a set of rules called packet filters. If two or more filters overlap, a filter conflict will occur and lead to ambiguity in packet classification. Further,...
ver más
|
|
|
|
|
|
|
Gengxian Li, Chundong Wang and Huaibin Wang
Decentralized networks bring us many benefits, but as networks evolve, many nodes either actively or passively become unreachable behind an NAT or a firewall. This has become a hindrance to the development of decentralized networks, where peer-to-peer co...
ver más
|
|
|
|
|
|
|
Claudio Marques, Silvestre Malta and João Magalhães
Nowadays there are many DNS firewall solutions to prevent users accessing malicious domains. These can provide real-time protection and block illegitimate communications, contributing to the cybersecurity posture of the organizations. Most of these solut...
ver más
|
|
|
|
|
|
|
Michael Alicea and Izzat Alsmadi
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is...
ver más
|
|
|
|
|
|
|
Konstantina Fotiadou, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou and Theodore Zahariadis
Network intrusion detection is a key pillar towards the sustainability and normal operation of information systems. Complex threat patterns and malicious actors are able to cause severe damages to cyber-systems. In this work, we propose novel Deep Learni...
ver más
|
|
|
|
|
|
|
Keyong Wang, Mengyao Tong, Dequan Yang and Yuhang Liu
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the pu...
ver más
|
|
|
|
|
|
|
Calum C. Hall, Lynsay A. Shepherd and Natalie Coull
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of ...
ver más
|
|
|
|