113 resources related to Virtual Firewall
- Topics related to Virtual Firewall
- IEEE Organizations related to Virtual Firewall
- Conferences related to Virtual Firewall
- Periodicals related to Virtual Firewall
- Most published Xplore authors for Virtual Firewall
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation
IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.
addresses the discipline of systems engineering,including theory, technology, methodology, andapplications of complex systems, system-of-systems,and integrated systems of national and globalsignificance.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...
The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...
2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), 2018
This paper presents a modeling of a virtual firewall, based on Stochastic Petri Nets (SPN) to analyze the performance in terms of throughput and delay. The firewall is part of a virtualized multitenant environment. To ensure that every tenant is protected against intrusion attempts, per tenant firewalls are a must. With this protection, each virtual environment located on a multitenant ...
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014
Cloud computing environments face many unique security challenges. Location- based firewalls with static policies require long provisioning times relative to other cloud data center components, and are not well suited to dynamic, virtualized workloads. In this paper, we discuss the use of virtual firewalls facilitated by software defined network overlays with forwarding graphs. Experimental results and performance measurements will be ...
2017 9th IEEE-GCC Conference and Exhibition (GCCCE), 2017
With the overhauls and increase in network size, it becomes harder to practice maintainability along with security. In recent years, software-defined networking (SDN) has evolved to replace the traditional design of the current network, and with such evolution, raises issues in the firewall. Firewalls are one of the most important components used in networks, and new challenges have been driven ...
2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016
Traditional firewalls are used to enforce network security policies at boundaries within a network. However, this can leave hosts vulnerable to attacks that originate from within the network they are part of. We leverage the flexibility of Software Defined Networking to turn the network infrastructure into a virtual firewall thus improving security across an entire network. We present ACLSwitch, a ...
2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), 2015
Network Function Virtualization (NFV) together with cloud technology enables users to request creating flexible virtual networks (VNs). Users also have specific security requirements to protect their VNs. Especially, due to changeable network perimeters, constant VM migrations, and user-centric security needs, VNs require new security features that traditional firewalls fail to provide, because traditional firewalls rely greatly on restricted network topology ...
Virtual World Symposium - Virtual World at Intel
Virtual World Symposium - Educational Work
Virtual World Symposium - Moon World
Virtual World Symposium - IEEE Islands
Virtual World Symposium - Second Life Tech Tour
Virtual World Symposium 2011 - Collaborative Work
Virtual World Symposium - Welcome Address
Virtual World Symposium - Project Direct
Virtual World Symposium 2011 - CoLab and Mars
Reconstructed Brain Models for Virtual Bodies and Robots
IMS 2012 Microapps - Virtual Flight Testing of Radar System Performance Daren McClearnon, Agilent EEsof
IEEE Cloud Computing for Emerging Markets: Buyya
Virtual World Symposium - SciLands
EMBC 2011-Course-Virtual Reality and Robotics in Neurorehabilitation-William Zev Rymer
EMBC 2011-Course-Virtual Reality and Robotics in Neurorehabilitation-Susan Fasoli
Virtual Reality Support for Teleoperation Using Online Grasp Planning
EMBC 2011-Course-Virtual Reality and Robotics in Neurorehabilitation-Steven L. Wolf
Building Worlds in Virtual Reality: Exploring Careers in Engineering and Technology
IEEE's Room-Scale VR Experience at SXSW 2017!
This paper presents a modeling of a virtual firewall, based on Stochastic Petri Nets (SPN) to analyze the performance in terms of throughput and delay. The firewall is part of a virtualized multitenant environment. To ensure that every tenant is protected against intrusion attempts, per tenant firewalls are a must. With this protection, each virtual environment located on a multitenant cloud is isolated and data is protected in case of an attack originating from within the cloud. Petri nets introduce some interactions that we have in the real system; we refer to sequential and parallel processing, concurrency, limited resources and mutual exclusion in shared resource access. The modeling is assessed by simulation and results are compared in different scenarios. The modeling also allows us to evaluate necessary resources that must be allocated to archive the desired throughput. Once the impact of key parameters on the global system performance is analyzed, results under several scenarios indicate that our proposal would succeed in an efficient resource allocation scheme in terms of throughput and delay.
Cloud computing environments face many unique security challenges. Location- based firewalls with static policies require long provisioning times relative to other cloud data center components, and are not well suited to dynamic, virtualized workloads. In this paper, we discuss the use of virtual firewalls facilitated by software defined network overlays with forwarding graphs. Experimental results and performance measurements will be presented using a variety of workloads running over a virtual firewall deployment with an industry standard virtual overlay network.
With the overhauls and increase in network size, it becomes harder to practice maintainability along with security. In recent years, software-defined networking (SDN) has evolved to replace the traditional design of the current network, and with such evolution, raises issues in the firewall. Firewalls are one of the most important components used in networks, and new challenges have been driven by the software-defined networks in implementing firewalls. The main issue of the firewall is its speed. The speed of the firewall is a hindrance; often firewall's link speeds are slower than the supported network interface and can cause the traffic burst from the host to be buffered until packets are processed. To overcome these issues, the aim of our project is to solve by implementing duplicate instances of the firewall. By designing two topologies, a single and multiple controllers, and implementing them in a simulated environment the resulting studies show that multiple controllers in a network environment tend to show an improved performance in the network than in a single controller network.
Traditional firewalls are used to enforce network security policies at boundaries within a network. However, this can leave hosts vulnerable to attacks that originate from within the network they are part of. We leverage the flexibility of Software Defined Networking to turn the network infrastructure into a virtual firewall thus improving security across an entire network. We present ACLSwitch, a network-wide virtual firewall that utilises the OpenFlow protocol to filter traffic across a network comprised of OpenFlow switches. We also define “policy domains” that allow different filtering configurations to be applied to different switches of the network. The solution allows rules to be distributed across a network without the need for a human operator to send the rules to switches separately, yet it is flexible enough to allow subsets of the switches to enforce different security policies.
Network Function Virtualization (NFV) together with cloud technology enables users to request creating flexible virtual networks (VNs). Users also have specific security requirements to protect their VNs. Especially, due to changeable network perimeters, constant VM migrations, and user-centric security needs, VNs require new security features that traditional firewalls fail to provide, because traditional firewalls rely greatly on restricted network topology and entry points to provide effective security protection. To address this challenge, we propose VNGuard, a framework for effective provision and management of virtual firewalls to safeguard VNs, leveraging features provided by NFV and Software Defined Networking (SDN). VNGuard defines a high-level firewall policy language, finds optimal virtual firewall placement, and adapts virtual firewalls to VN changes. To demonstrate the feasibility of our approach, we have implemented core components of VNGuard on top of ClickOS. Our experimental results demonstrate the effectiveness and efficiency of virtual firewalls built on VNGuard.
The iNetwork Simulator is a software application created provides a user- friendly graphical interface for building and simulating basic communication networks. Such networks can comprise of devices such as workstations, servers, switches and routers. This project enhances the iNetwork Simulator application by allowing firewalls to be simulated. Firewalls play in integral part in the security infrastructure of many organisations (and individuals). Being able to interact with a virtual firewall would benefit many students with an interest in the security-related aspects of communication networks. The firewall component was implemented using the Microsoft .NET Framework and the C# programming language (the same platform used to originally develop the iNetwork Simulator application). The full software development lifecycle was followed during the course of this project
In cloud computing, at storage level, security provided to cloud by access control and data encryption key, and at network level installing virtual firewall and cloud service provider provides its internal storage for storing client's data using ips/ids to protect against attacks. Storing data in encrypted format is a common method of data privacy protection which causes a risk for the unauthorized disclosure of the user data. In this paper, discuss the introduction of cloud computing, framework for public cloud security, cloud service providers, authentication mechanism and attributes. There all different mechanism is explained for providing privacy in public cloud services on basis of the desired and proposed architecture.
Cloud computing delivery model can significantly reduce enterprise IT costs and complexities. This technology can handle the rapidly gowning environment and provide more flexible resources sharing and hence it has become as anew information technology infrastructure recently. In contrast to traditional enterprise IT solution, cloud computing moves the application software and databases to the servers in large data centers which raise many security challenges. The business model now allows the users to purchase the capacity they require when they require it. The providers can maximize the utilization by multiplexing customer virtual machines (VMs) across a shared physical infrastructure. In the shared cloud environment, it would be possible to launch an attack cross VMs. How to define the policies for individual virtual firewall becomes more important. In this paper, we investigate the different security vulnerability assessments among the cloud environments. Experiment shows there are more vulnerability happened if vulnerability tools and the servers are in the same LAN. In other word, the hackers can find an easier way to get the target information if sit on the same LAN. This experimental result can be used to analysis the risk in third party compute clouds.
Elasticity for cloud-based services and applications has been studied in the literature to some extent. However, the literature is lacking thorough study on elasticity for cloud-based firewalls. This paper proposes an architectural framework for an elastic virtual firewall service to be deployed at cloud datacenters. The paper presents an analytical model based on Markov chain and queueing theory that can be used to achieve elasticity for cloud-based firewalls. In particular, the model captures the behavior of a cloud-based firewall service comprising a load balancer and a variable number of virtual firewalls. From the analytical model, we then derive closed-form formulas to estimate the minimal number of virtual firewalls required to satisfy a given SLA response time. The model takes as input key system input parameters that include workload, processing capacity of load balancer and virtual machines, as well as firewall rulebase interrogation.
Network Functions Virtualization (NFV) is a technology for running software- based functions on commodity hardware, which can lead to cost savings and flexible functionality. However, due to the software processing of network functions, the performance of Virtualized Network Functions (VNFs) is considerably degraded in relation to the types of VNFs and the configuration of VNF applications. Therefore, for a practical NFV system, grasping the accurate workload of VNF applications and managing the VNF performance are important. This paper focuses on analysis of a virtual firewall as a representative VNF. We first reveal new insights about the performance characteristics of the virtual firewall through preliminary experiments. Furthermore, we propose a method for estimating the hidden workload of the virtual firewall by using the number of rules in an Access Control List (ACL) and the traffic volume for each rule. Finally, we show the effectiveness of the proposed methods.
This standard will define standard communication test scenarios for messages to be exchanged between electrical power substation intelligent electronic devices (IEDS). The scenarios will define message transactions between applications within the substation and between substation IEDs and remotely located applications. The scenarios will not specify the communication protocol required to implement the transactions.