Conferences related to Virtual Firewall

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC)

All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation


2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC)

To provide a forum for free discussions of new ideas, research, development and applications in order to stimulate and inspire pioneering work in the field of digital avionics and related areas.To acquire high quality technical papers for publication in a DASC Proceedings and other appropriate publications such as the AIAA Journal of Aircraft and IEEE Systems Magazine.To provide a meeting that will further the progress of AIAA and IEEE entities, including Societies, Technical Committees and local Sections and thereby better serve the interests of all AIAA and IEEE members and the community at large.To provide an atmosphere that strengthens the interpersonal rapport of a large number of engineers and scientists interested in specialized and closely related fields.To provide an exhibition of current hardware and software products, methods and tools.To provide instruction in advances in digital avionics and to encourage and reward student academic participation.



Periodicals related to Virtual Firewall

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...



Most published Xplore authors for Virtual Firewall

Back to Top

Xplore Articles related to Virtual Firewall

Back to Top

Model of a Virtual Firewall Based on Stochastic Petri Nets

2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), 2018

This paper presents a modeling of a virtual firewall, based on Stochastic Petri Nets (SPN) to analyze the performance in terms of throughput and delay. The firewall is part of a virtualized multitenant environment. To ensure that every tenant is protected against intrusion attempts, per tenant firewalls are a must. With this protection, each virtual environment located on a multitenant ...


Virtual Firewall Performance as a Waypoint on a Software Defined Overlay Network

2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014

Cloud computing environments face many unique security challenges. Location- based firewalls with static policies require long provisioning times relative to other cloud data center components, and are not well suited to dynamic, virtualized workloads. In this paper, we discuss the use of virtual firewalls facilitated by software defined network overlays with forwarding graphs. Experimental results and performance measurements will be ...


Implementation of Virtual Firewall Function in SDN (Software Defined Networks)

2017 9th IEEE-GCC Conference and Exhibition (GCCCE), 2017

With the overhauls and increase in network size, it becomes harder to practice maintainability along with security. In recent years, software-defined networking (SDN) has evolved to replace the traditional design of the current network, and with such evolution, raises issues in the firewall. Firewalls are one of the most important components used in networks, and new challenges have been driven ...


Network-wide virtual firewall using SDN/OpenFlow

2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Traditional firewalls are used to enforce network security policies at boundaries within a network. However, this can leave hosts vulnerable to attacks that originate from within the network they are part of. We leverage the flexibility of Software Defined Networking to turn the network infrastructure into a virtual firewall thus improving security across an entire network. We present ACLSwitch, a ...


VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls

2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), 2015

Network Function Virtualization (NFV) together with cloud technology enables users to request creating flexible virtual networks (VNs). Users also have specific security requirements to protect their VNs. Especially, due to changeable network perimeters, constant VM migrations, and user-centric security needs, VNs require new security features that traditional firewalls fail to provide, because traditional firewalls rely greatly on restricted network topology ...



Educational Resources on Virtual Firewall

Back to Top

IEEE-USA E-Books

  • Model of a Virtual Firewall Based on Stochastic Petri Nets

    This paper presents a modeling of a virtual firewall, based on Stochastic Petri Nets (SPN) to analyze the performance in terms of throughput and delay. The firewall is part of a virtualized multitenant environment. To ensure that every tenant is protected against intrusion attempts, per tenant firewalls are a must. With this protection, each virtual environment located on a multitenant cloud is isolated and data is protected in case of an attack originating from within the cloud. Petri nets introduce some interactions that we have in the real system; we refer to sequential and parallel processing, concurrency, limited resources and mutual exclusion in shared resource access. The modeling is assessed by simulation and results are compared in different scenarios. The modeling also allows us to evaluate necessary resources that must be allocated to archive the desired throughput. Once the impact of key parameters on the global system performance is analyzed, results under several scenarios indicate that our proposal would succeed in an efficient resource allocation scheme in terms of throughput and delay.

  • Virtual Firewall Performance as a Waypoint on a Software Defined Overlay Network

    Cloud computing environments face many unique security challenges. Location- based firewalls with static policies require long provisioning times relative to other cloud data center components, and are not well suited to dynamic, virtualized workloads. In this paper, we discuss the use of virtual firewalls facilitated by software defined network overlays with forwarding graphs. Experimental results and performance measurements will be presented using a variety of workloads running over a virtual firewall deployment with an industry standard virtual overlay network.

  • Implementation of Virtual Firewall Function in SDN (Software Defined Networks)

    With the overhauls and increase in network size, it becomes harder to practice maintainability along with security. In recent years, software-defined networking (SDN) has evolved to replace the traditional design of the current network, and with such evolution, raises issues in the firewall. Firewalls are one of the most important components used in networks, and new challenges have been driven by the software-defined networks in implementing firewalls. The main issue of the firewall is its speed. The speed of the firewall is a hindrance; often firewall's link speeds are slower than the supported network interface and can cause the traffic burst from the host to be buffered until packets are processed. To overcome these issues, the aim of our project is to solve by implementing duplicate instances of the firewall. By designing two topologies, a single and multiple controllers, and implementing them in a simulated environment the resulting studies show that multiple controllers in a network environment tend to show an improved performance in the network than in a single controller network.

  • Network-wide virtual firewall using SDN/OpenFlow

    Traditional firewalls are used to enforce network security policies at boundaries within a network. However, this can leave hosts vulnerable to attacks that originate from within the network they are part of. We leverage the flexibility of Software Defined Networking to turn the network infrastructure into a virtual firewall thus improving security across an entire network. We present ACLSwitch, a network-wide virtual firewall that utilises the OpenFlow protocol to filter traffic across a network comprised of OpenFlow switches. We also define “policy domains” that allow different filtering configurations to be applied to different switches of the network. The solution allows rules to be distributed across a network without the need for a human operator to send the rules to switches separately, yet it is flexible enough to allow subsets of the switches to enforce different security policies.

  • VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls

    Network Function Virtualization (NFV) together with cloud technology enables users to request creating flexible virtual networks (VNs). Users also have specific security requirements to protect their VNs. Especially, due to changeable network perimeters, constant VM migrations, and user-centric security needs, VNs require new security features that traditional firewalls fail to provide, because traditional firewalls rely greatly on restricted network topology and entry points to provide effective security protection. To address this challenge, we propose VNGuard, a framework for effective provision and management of virtual firewalls to safeguard VNs, leveraging features provided by NFV and Software Defined Networking (SDN). VNGuard defines a high-level firewall policy language, finds optimal virtual firewall placement, and adapts virtual firewalls to VN changes. To demonstrate the feasibility of our approach, we have implemented core components of VNGuard on top of ClickOS. Our experimental results demonstrate the effectiveness and efficiency of virtual firewalls built on VNGuard.

  • Teaching about Firewall Concepts using the iNetwork Simulator

    The iNetwork Simulator is a software application created provides a user- friendly graphical interface for building and simulating basic communication networks. Such networks can comprise of devices such as workstations, servers, switches and routers. This project enhances the iNetwork Simulator application by allowing firewalls to be simulated. Firewalls play in integral part in the security infrastructure of many organisations (and individuals). Being able to interact with a virtual firewall would benefit many students with an interest in the security-related aspects of communication networks. The firewall component was implemented using the Microsoft .NET Framework and the C# programming language (the same platform used to originally develop the iNetwork Simulator application). The full software development lifecycle was followed during the course of this project

  • The architechtural framework for public cloud security

    In cloud computing, at storage level, security provided to cloud by access control and data encryption key, and at network level installing virtual firewall and cloud service provider provides its internal storage for storing client's data using ips/ids to protect against attacks. Storing data in encrypted format is a common method of data privacy protection which causes a risk for the unauthorized disclosure of the user data. In this paper, discuss the introduction of cloud computing, framework for public cloud security, cloud service providers, authentication mechanism and attributes. There all different mechanism is explained for providing privacy in public cloud services on basis of the desired and proposed architecture.

  • Analysis on Cloud-Based Security Vulnerability Assessment

    Cloud computing delivery model can significantly reduce enterprise IT costs and complexities. This technology can handle the rapidly gowning environment and provide more flexible resources sharing and hence it has become as anew information technology infrastructure recently. In contrast to traditional enterprise IT solution, cloud computing moves the application software and databases to the servers in large data centers which raise many security challenges. The business model now allows the users to purchase the capacity they require when they require it. The providers can maximize the utilization by multiplexing customer virtual machines (VMs) across a shared physical infrastructure. In the shared cloud environment, it would be possible to launch an attack cross VMs. How to define the policies for individual virtual firewall becomes more important. In this paper, we investigate the different security vulnerability assessments among the cloud environments. Experiment shows there are more vulnerability happened if vulnerability tools and the servers are in the same LAN. In other word, the hackers can find an easier way to get the target information if sit on the same LAN. This experimental result can be used to analysis the risk in third party compute clouds.

  • An analytical model to achieve elasticity for cloud-based firewalls

    Elasticity for cloud-based services and applications has been studied in the literature to some extent. However, the literature is lacking thorough study on elasticity for cloud-based firewalls. This paper proposes an architectural framework for an elastic virtual firewall service to be deployed at cloud datacenters. The paper presents an analytical model based on Markov chain and queueing theory that can be used to achieve elasticity for cloud-based firewalls. In particular, the model captures the behavior of a cloud-based firewall service comprising a load balancer and a variable number of virtual firewalls. From the analytical model, we then derive closed-form formulas to estimate the minimal number of virtual firewalls required to satisfy a given SLA response time. The model takes as input key system input parameters that include workload, processing capacity of load balancer and virtual machines, as well as firewall rulebase interrogation.

  • A new index of hidden workload for firewall rule processing on virtual machine

    Network Functions Virtualization (NFV) is a technology for running software- based functions on commodity hardware, which can lead to cost savings and flexible functionality. However, due to the software processing of network functions, the performance of Virtualized Network Functions (VNFs) is considerably degraded in relation to the types of VNFs and the configuration of VNF applications. Therefore, for a practical NFV system, grasping the accurate workload of VNF applications and managing the VNF performance are important. This paper focuses on analysis of a virtual firewall as a representative VNF. We first reveal new insights about the performance characteristics of the virtual firewall through preliminary experiments. Furthermore, we propose a method for estimating the hidden workload of the virtual firewall by using the number of rules in an Access Control List (ACL) and the traffic volume for each rule. Finally, we show the effectiveness of the proposed methods.



Standards related to Virtual Firewall

Back to Top

IEEE Standard Test Method for Use in the Evaluation of Message Communications Between Intelligent Electronic Devices in an Integrated Substation Protection, Control and Data Acquisition System

This standard will define standard communication test scenarios for messages to be exchanged between electrical power substation intelligent electronic devices (IEDS). The scenarios will define message transactions between applications within the substation and between substation IEDs and remotely located applications. The scenarios will not specify the communication protocol required to implement the transactions.