Essays about: "firewall performance"
Showing result 1 - 5 of 21 essays containing the words firewall performance.
-
1. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE
-
2. Ansible in different cloud environments
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Cloud computing offers higher reliability and lower up-front IT costs than traditional computing environments and is a great way to dynamically scale both resources and capabilities. For further efficiency and consistency, cloud computing tasks can also be automated with tools such as Ansible. READ MORE
-
3. A Cross-Platform Always On VPN Solution for Ensuring Online Security
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : This thesis examines the implementation of an Always On VPN solution for Windows 10 and macOS, focusing on the configuration of a Palo Alto Firewall to enable their GlobalProtect VPN as Always On. This means that the VPN solution is enabled on a device at all times. READ MORE
-
4. Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. READ MORE
-
5. Root Cause Analysis and Classification for Firewall Log Events Using NLP Methods
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Network log records are robust evidence for enterprises to make error diagnoses. The current method of Ericsson’s Networks team for troubleshooting is mainly by manual observation. However, as the system is getting vast and complex, the log messages show a growth trend. READ MORE