Review of firewall optimization techniques

Firewall is a vital component in network security. Changes in requirements due to the growth of the Internet and increasing types of attack lead to the larger size of firewall policies and consequently affect the firewall performance. Hence, the network security policy will also be jeopardized. Mini...

Full description

Bibliographic Details
Main Authors: Shakirah, Saidin, Mohamad Fadli, Zolkipli
Format: Conference or Workshop Item
Language:English
Published: Universiti Malaysia Pahang 2018
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/23032/7/Review%20of%20Firewall%20Optimization%20Techniques3.pdf
_version_ 1796993042011389952
author Shakirah, Saidin
Mohamad Fadli, Zolkipli
author_facet Shakirah, Saidin
Mohamad Fadli, Zolkipli
author_sort Shakirah, Saidin
collection UMP
description Firewall is a vital component in network security. Changes in requirements due to the growth of the Internet and increasing types of attack lead to the larger size of firewall policies and consequently affect the firewall performance. Hence, the network security policy will also be jeopardized. Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. This paper review firewall optimization techniques such as data mining, anomaly detection, and traffic awareness, that have been done throughout time. Suggestion to combine the removing anomalies technique and data mining technique to enhance firewall performance further is also mention in this paper. As a result, this paper will be useful for researchers who are interested in learning more about firewall optimization techniques.
first_indexed 2024-03-06T12:28:18Z
format Conference or Workshop Item
id UMPir23032
institution Universiti Malaysia Pahang
language English
last_indexed 2024-03-06T12:28:18Z
publishDate 2018
publisher Universiti Malaysia Pahang
record_format dspace
spelling UMPir230322019-07-24T01:19:07Z http://umpir.ump.edu.my/id/eprint/23032/ Review of firewall optimization techniques Shakirah, Saidin Mohamad Fadli, Zolkipli QA76 Computer software Firewall is a vital component in network security. Changes in requirements due to the growth of the Internet and increasing types of attack lead to the larger size of firewall policies and consequently affect the firewall performance. Hence, the network security policy will also be jeopardized. Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. This paper review firewall optimization techniques such as data mining, anomaly detection, and traffic awareness, that have been done throughout time. Suggestion to combine the removing anomalies technique and data mining technique to enhance firewall performance further is also mention in this paper. As a result, this paper will be useful for researchers who are interested in learning more about firewall optimization techniques. Universiti Malaysia Pahang 2018-08 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/23032/7/Review%20of%20Firewall%20Optimization%20Techniques3.pdf Shakirah, Saidin and Mohamad Fadli, Zolkipli (2018) Review of firewall optimization techniques. In: Proceedings Book: National Conference for Postgraduate Research (NCON-PGR 2018) , 28-29 August 2018 , Universiti Malaysia Pahang, Gambang, Pahang. pp. 15-21.. ISBN 978-967-22260-5-5 http://ncon-pgr.ump.edu.my/index.php/en/download/proceedings-book
spellingShingle QA76 Computer software
Shakirah, Saidin
Mohamad Fadli, Zolkipli
Review of firewall optimization techniques
title Review of firewall optimization techniques
title_full Review of firewall optimization techniques
title_fullStr Review of firewall optimization techniques
title_full_unstemmed Review of firewall optimization techniques
title_short Review of firewall optimization techniques
title_sort review of firewall optimization techniques
topic QA76 Computer software
url http://umpir.ump.edu.my/id/eprint/23032/7/Review%20of%20Firewall%20Optimization%20Techniques3.pdf
work_keys_str_mv AT shakirahsaidin reviewoffirewalloptimizationtechniques
AT mohamadfadlizolkipli reviewoffirewalloptimizationtechniques