Skip to main content
Article thumbnail
Location of Repository

Analysis of firewall security

By Bogdan Cocosel

Abstract

Firewalls are one of the most used security enforcement methods used these days to protect internal company networks from intruders. But can a firewall be "penetrated" or "destroyed" by a sophisticated and/or concentrated attack? In this paper, a general evaluation of the firewall technology will be made (with its strengths and weaknesses) an also a case study over two well-known firewall-protected sites: AT&T Bell Laboratories ( @research.att.com) and Digital Equipment Corporation ( @dec.com) will be done. The reliabilit

Year: 1996
OAI identifier: oai:CiteSeerX.psu:10.1.1.135.4808
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.cs.ucsb.edu/~bcocos... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.