Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Deep packet analysis firewall model

View through CrossRef
Firewall (software or hardware device that monitors traffic into and out of the network). It can be classified as stateless or stateful. The existing firewalls are only concerned with filtering packets based on the information contained in the header part of every packet. The most improved stateful inspection firewalls have a state table enabling the storage of header information such as source address, destination address, port, connection status and protocol.  Consequently, existing firewalls can be compared to only reading the book tittle and foregoing other essential activities such as evaluating the content of the book. The proposed Deep packet analysis firewall model, not only evaluated the header content of a packet but also open and examines the content in a packet in order to detect and block any threats. In addition, the proposed model will be analyzing the actual content of the traffic that is flowing through packet as opposed to existing firewall which only focuses on analyzing the header content. The model will also locate, detect, categorize, block, or reroute packets having certain data payload and specific codes that are not located, detected, categorized, blocked or redirected by existing firewall. Therefore, deep packet analysis firewall model is a feasible approach to overcome challenges faced in cyberspace today. The proposed Deep packet analysis firewall model will use mixed research method. Quantitative method will include obtaining data from the peer reviewed academic articles in the area of study. Quantitative method will also entail using a simulation by feeding quantitative data into the model to produce quantitative results. Finally, qualitative method will include conducting interviews and use of questionnaires
Title: Deep packet analysis firewall model
Description:
Firewall (software or hardware device that monitors traffic into and out of the network).
It can be classified as stateless or stateful.
The existing firewalls are only concerned with filtering packets based on the information contained in the header part of every packet.
The most improved stateful inspection firewalls have a state table enabling the storage of header information such as source address, destination address, port, connection status and protocol.
  Consequently, existing firewalls can be compared to only reading the book tittle and foregoing other essential activities such as evaluating the content of the book.
The proposed Deep packet analysis firewall model, not only evaluated the header content of a packet but also open and examines the content in a packet in order to detect and block any threats.
In addition, the proposed model will be analyzing the actual content of the traffic that is flowing through packet as opposed to existing firewall which only focuses on analyzing the header content.
The model will also locate, detect, categorize, block, or reroute packets having certain data payload and specific codes that are not located, detected, categorized, blocked or redirected by existing firewall.
Therefore, deep packet analysis firewall model is a feasible approach to overcome challenges faced in cyberspace today.
The proposed Deep packet analysis firewall model will use mixed research method.
Quantitative method will include obtaining data from the peer reviewed academic articles in the area of study.
Quantitative method will also entail using a simulation by feeding quantitative data into the model to produce quantitative results.
Finally, qualitative method will include conducting interviews and use of questionnaires.

Related Results

Dynamic deep stateful firewall packet analysis model
Dynamic deep stateful firewall packet analysis model
Due to challenges of COVID -19 pandemic, network is widely used and more networkthreats are evolving, therefore, there is a need to improve network tools in order tocontrol threats...
A Fireworks-Based Approach for Efficient Packet Filtering in Firewall
A Fireworks-Based Approach for Efficient Packet Filtering in Firewall
Information protection in computers is gaining a lot of importance in real world applications. To secure the private networks of businesses and institutions, a firewall is installe...
FFF: Fast Firewall Framework to Enhance Rule Verifying over High-speed Networks
FFF: Fast Firewall Framework to Enhance Rule Verifying over High-speed Networks
The current traffic trend on computer networks is growing exponentially, affecting network firewalls because they constantly have to filter out massive amounts of data. In this pap...
Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website
Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya un...
Wave packet dynamics of the photodetachment ofH- near a metal surface
Wave packet dynamics of the photodetachment ofH- near a metal surface
The wave packet dynamics of the photodetachment of H- near metal surface is studied by using the wave packet evolution and the autocorrelation function. The results show that the e...
Predictive Maintenance on Fortinet Firewall Devices Using Artificial Intelligence
Predictive Maintenance on Fortinet Firewall Devices Using Artificial Intelligence
The growing complexity of enterprise network infrastructures has increased the importance of predictive maintenance for network security devices, particularly firewall systems. In ...
Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware
Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware
Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime. This is very dangerous and ca...

Back to Top