1 code implementation • 28 Dec 2017 • Michael Bargury, Roy Levin, Royi Ronen
The results prove the hypothesis that firewall rules can be automatically generated based on router data, and that an automated method can be effective in blocking a high percentage of malicious traffic.