Mining Firewall Traffic for Better Net Security

Researchers at the Univeristy of Texas at Dallas have developed a method for analyzing the activity log
files of corporate firewalls. Their analysis can determine what rules the firewall is actually applying
to incoming and outgoing network traffic and then compare these with
the original rules to spot errors and omissions. Read the full article. [Science Daily]

Researchers at the Univeristy of Texas at Dallas have developed a method for analyzing the activity log
files of corporate firewalls. Their analysis can determine what rules the firewall is actually applying
to incoming and outgoing network traffic and then compare these with
the original rules to spot errors and omissions. Read the full article. [Science Daily]

Suggested articles

Discussion

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.