Review of firewall optimization techniques
Firewall is a vital component in network security. Changes in requirements due to the growth of the Internet and increasing types of attack lead to the larger size of firewall policies and consequently affect the firewall performance. Hence, the network security policy will also be jeopardized. Mini...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Universiti Malaysia Pahang
2018
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/23032/7/Review%20of%20Firewall%20Optimization%20Techniques3.pdf |
_version_ | 1796993042011389952 |
---|---|
author | Shakirah, Saidin Mohamad Fadli, Zolkipli |
author_facet | Shakirah, Saidin Mohamad Fadli, Zolkipli |
author_sort | Shakirah, Saidin |
collection | UMP |
description | Firewall is a vital component in network security. Changes in requirements due to the growth of the Internet and increasing types of attack lead to the larger size of firewall policies and consequently affect the firewall performance. Hence, the network security policy will also be jeopardized. Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. This paper review firewall optimization techniques such as data mining, anomaly detection, and traffic awareness, that have been done throughout time. Suggestion to combine the removing anomalies technique and data mining technique to enhance firewall performance further is also mention in this paper. As a result, this paper will be useful for researchers who are interested in learning more about firewall optimization techniques. |
first_indexed | 2024-03-06T12:28:18Z |
format | Conference or Workshop Item |
id | UMPir23032 |
institution | Universiti Malaysia Pahang |
language | English |
last_indexed | 2024-03-06T12:28:18Z |
publishDate | 2018 |
publisher | Universiti Malaysia Pahang |
record_format | dspace |
spelling | UMPir230322019-07-24T01:19:07Z http://umpir.ump.edu.my/id/eprint/23032/ Review of firewall optimization techniques Shakirah, Saidin Mohamad Fadli, Zolkipli QA76 Computer software Firewall is a vital component in network security. Changes in requirements due to the growth of the Internet and increasing types of attack lead to the larger size of firewall policies and consequently affect the firewall performance. Hence, the network security policy will also be jeopardized. Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. This paper review firewall optimization techniques such as data mining, anomaly detection, and traffic awareness, that have been done throughout time. Suggestion to combine the removing anomalies technique and data mining technique to enhance firewall performance further is also mention in this paper. As a result, this paper will be useful for researchers who are interested in learning more about firewall optimization techniques. Universiti Malaysia Pahang 2018-08 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/23032/7/Review%20of%20Firewall%20Optimization%20Techniques3.pdf Shakirah, Saidin and Mohamad Fadli, Zolkipli (2018) Review of firewall optimization techniques. In: Proceedings Book: National Conference for Postgraduate Research (NCON-PGR 2018) , 28-29 August 2018 , Universiti Malaysia Pahang, Gambang, Pahang. pp. 15-21.. ISBN 978-967-22260-5-5 http://ncon-pgr.ump.edu.my/index.php/en/download/proceedings-book |
spellingShingle | QA76 Computer software Shakirah, Saidin Mohamad Fadli, Zolkipli Review of firewall optimization techniques |
title | Review of firewall optimization techniques |
title_full | Review of firewall optimization techniques |
title_fullStr | Review of firewall optimization techniques |
title_full_unstemmed | Review of firewall optimization techniques |
title_short | Review of firewall optimization techniques |
title_sort | review of firewall optimization techniques |
topic | QA76 Computer software |
url | http://umpir.ump.edu.my/id/eprint/23032/7/Review%20of%20Firewall%20Optimization%20Techniques3.pdf |
work_keys_str_mv | AT shakirahsaidin reviewoffirewalloptimizationtechniques AT mohamadfadlizolkipli reviewoffirewalloptimizationtechniques |