Mining Firewall Traffic for Better Net Security

Researchers at the Univeristy of Texas at Dallas have developed a method for analyzing the activity log
files of corporate firewalls. Their analysis can determine what rules the firewall is actually applying
to incoming and outgoing network traffic and then compare these with
the original rules to spot errors and omissions. Read the full article. [Science Daily]

Researchers at the Univeristy of Texas at Dallas have developed a method for analyzing the activity log
files of corporate firewalls. Their analysis can determine what rules the firewall is actually applying
to incoming and outgoing network traffic and then compare these with
the original rules to spot errors and omissions. Read the full article. [Science Daily]

Suggested articles

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

ACCEPT AND CLOSE