Essays about: "firewall performance"

Showing result 1 - 5 of 21 essays containing the words firewall performance.

  1. 1. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  2. 2. Ansible in different cloud environments

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Axel Witt; Sebastian Westling; [2023]
    Keywords : Ansible; Cloud; AWS; GCP; Azure; Automation;

    Abstract : Cloud computing offers higher reliability and lower up-front IT costs than traditional computing environments and is a great way to dynamically scale both resources and capabilities. For further efficiency and consistency, cloud computing tasks can also be automated with tools such as Ansible. READ MORE

  3. 3. A Cross-Platform Always On VPN Solution for Ensuring Online Security

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Adam Thiede; Josef Samen; [2023]
    Keywords : Always On; VPN; Cross-Platform; Palo Alto;

    Abstract : This thesis examines the implementation of an Always On VPN solution for Windows 10 and macOS, focusing on the configuration of a Palo Alto Firewall to enable their GlobalProtect VPN as Always On. This means that the VPN solution is enabled on a device at all times. READ MORE

  4. 4. Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pojan Shahrivar; [2022]
    Keywords : Vulnerability Scanning; Random Forest; Web application security; Next-Gen Web application Firewall; Machine learning; Dynamic application security testing; Intrusion detection prevention;

    Abstract : It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. READ MORE

  5. 5. Root Cause Analysis and Classification for Firewall Log Events Using NLP Methods

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tongxin Wang; [2022]
    Keywords : Log Analysis; BERT; Natural Language Processing; Log Classification; Transformers; Log Analysis; BERT; Naturligt språk-behandling; Log-Klassificering; Transformers;

    Abstract : Network log records are robust evidence for enterprises to make error diagnoses. The current method of Ericsson’s Networks team for troubleshooting is mainly by manual observation. However, as the system is getting vast and complex, the log messages show a growth trend. READ MORE