本文主要讲的是防火墙的研究，在Albert et al.(2007)的研究中，研究人员已经证明存在漏洞。他们进行了一个实验，以评估和模拟Linux内核的防火墙，重点关注由错误和违反产生的安全性所导致的安全漏洞。Albert等人(2005)的研究表明，可以使用DNS进行重新绑定。这种重新绑定可以帮助绕过防火墙和破坏web。他们还建议使用一种称为dns墙的单独工具来防止绕过防火墙。本篇代做assignment文章由美国论文通AssignmentPass辅导网整理，供大家参考阅读。
In Albert et al. (2007) study it has been proven by researchers that there are vulnerabilities existing. They conducted an experiment to evaluate and model firewalls with Linux Kernel with focus over the security vulnerabilities caused by error and violations of resulting security. In the study by Albert et al. (2005), it has been shown that use of DNS can be done to rebind. This rebinding can help in circumventing the firewalls and disrupting the web. They further had proposed the utilization of an individual tool known as the dns wall for combating circumvent of firewalls.
In brief, it can be said that there is a gap in literature research in the sense that no studies previously have been done to show a comprehensive analytical procedure over the influence of firewalls on the performance of networks. There exist basically two kinds of attacks under DDoS. The first type is the bandwidth depletion attack. It has been designed for flooding the network of the victim with traffic of unwanted nature which results in preventing the traffic of legitimate nature to go into primary systems of the victim. These attacks furthermore are of 2 key types (Jang et al. 110-122).
First one is the attack through flooding which includes the secondary systems of victim to send major traffic volume to a system of victim. It will congest, eventually the bandwidth of the system of the victim. The second one is the attack through amplification which is inclusive either of the attacker or the system of the victim for sending messages to an IP address through broadcasting it (Kaur et al. 200-204). This will eventually result in causing every system within the subnet to be explored through the address being broadcasted for sending a message to the system of the victim.