Firewalls are one of the most used security enforcement methods used these days to protect internal company networks from intruders. But can a firewall be "penetrated" or "destroyed" by a sophisticated and/or concentrated attack? In this paper, a general evaluation of the firewall technology will be made (with its strengths and weaknesses) an also a case study over two well-known firewall-protected sites: AT&T Bell Laboratories ( @research.att.com) and Digital Equipment Corporation ( @dec.com) will be done. The reliabilit
To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.