Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Improving cloud network security using the Tree-Rule firewall (2013)
Journal Article
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024

This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., Listed-Rule firewalls) have their limita... Read More about Improving cloud network security using the Tree-Rule firewall.

Generation of Network Behaviour Descriptions Using MCA Based on TAM (2013)
Presentation / Conference Contribution
Tan, Z. (2013, March). Generation of Network Behaviour Descriptions Using MCA Based on TAM. Paper presented at Kaspersky Lab's 2013 Annual Student Cyber Security Conference

In this paper, a multivariate correlation analysis technique based on triangle area map is introduced. The technique is applied for network traffic characterization and provides quality network behaviour descriptors for intrusion detectors to use. Th... Read More about Generation of Network Behaviour Descriptions Using MCA Based on TAM.