Optimization of firewalls in modern cybersecurity systems
| dc.contributor.author | Oleksandr Sokolets | en |
| dc.contributor.author | Bilous Natalia | en |
| dc.contributor.author | Наталя Білоус | en |
| dc.date.accessioned | 2026-01-26T13:07:08Z | |
| dc.date.available | 2026-01-26T13:07:08Z | |
| dc.date.issued | 2025 | |
| dc.description | Teljes kiadvány: https://kme.org.ua/uk/publications/rol-bezpeki-v-transkordonnomu-ta-mizhnarodnomu-spivrobitnictvi/ | en |
| dc.description.abstract | Abstract. In the era of increasing digitalization and the expansion of network infrastructures, cybersecurity has become one of the key priorities for organizations of any scale. Firewalls, as one of the oldest yet most fundamental components of protection systems, play a crucial role in filtering network traffic and preventing unauthorized access. However, with the growing volume of data, the complexity of attacks, and the proliferation of cloud technologies, traditional firewall configurations are often unable to ensure both high performance and sufficient security levels. Therefore, the optimization of firewalls—their architectures, policies, and operational algorithms—becomes a decisive factor in achieving a balance between speed, scalability, and protection efficiency. Modern enterprises deploy dozens or even hundreds of firewalls across hybrid infrastructures, including on-premises and cloud segments. Without optimization, such systems can experience: - Network latency due to excessive or conflicting security rules; - Vulnerabilities caused by outdated configurations; - Overhead in traffic inspection and logging processes. Optimizing firewalls helps not only to increase packet-processing performance but also to reduce attack surfaces and simplify policy management. Moreover, with the integration of AI, ML, and automated orchestration, optimization becomes part of an adaptive cybersecurity framework that can self-tune in response to real-time threats. | en |
| dc.identifier.citation | In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 64-65. | en |
| dc.identifier.isbn | 978-617-8143-50-3 (puhatáblás) | |
| dc.identifier.isbn | 978-617-8143-51-0 (PDF) | |
| dc.identifier.uri | https://dspace.kme.org.ua/handle/123456789/5786 | |
| dc.language.iso | en | en |
| dc.publisher | II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem | en |
| dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
| dc.subject | firewalls | en |
| dc.subject | cybersecurity | en |
| dc.title | Optimization of firewalls in modern cybersecurity systems | en |
| dc.type | dc.type.conferenceAbstract | en |
Файли
Контейнер файлів
1 - 1 з 1
Вантажиться...
- Назва:
- Optimization_of_firewalls_in_modern_cybersecurity_systems_2025.pdf
- Розмір:
- 9.76 MB
- Формат:
- Adobe Portable Document Format
- Опис:
- In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 64-65.
Ліцензійна угода
1 - 1 з 1
Вантажиться...
- Назва:
- license.txt
- Розмір:
- 10.65 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: