Date of Publication :7th February 2018
Abstract: Computer networks and internet networks face an increasing number of security threats. For new types of attacks constantly emerging, a serious challenge is the development of versatile and innovative security-oriented approaches. This paper addresses the protection of computer systems and how computer-related assets and resources can be secured. A firewall is software that creates a security perimeter with the primary task of blocking or restricting all incoming and outgoing information over a network. These firewalls are basically ineffective and suitable for enterprise environments to maintain information security while supporting the free exchange of views. In this paper we are discussing a network firewall that protects both the corporate environment and the other networks that want to exchange information over the network. A firewall prevents the flow of internet traffic and is less restrictive of outward and inward information and also offers the illusion of anonymous internet File Transfer Protocol and site access
Reference :
-
- E. W. Fulp, “Firewalls,” in Managing Information Security: Second Edition, 2013.
- R. Marty and B. Rexroad, “Network security,” in Building the Network of the Future: Getting Smarter, Faster, and More Flexible with a Software Centric Approach, 2017.
- B. Yang, “Firewall,” in Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances, 2011.
- P. Rengaraju, V. R. Ramanan, and C. H. Lung, “Detection and prevention of DoS attacks in Software-Defined Cloud networks,” in 2017 IEEE Conference on Dependable and Secure Computing, 2017, doi: 10.1109/DESEC.2017.8073810. [5] Cisco, “What Is a Firewall?,” Cisco. 2017.
- A. Wool, “Trends in firewall configuration errors: Measuring the holes in Swiss cheese,” IEEE Internet Computing. 2010, doi: 10.1109/MIC.2010.29.
- X. Xu, Z. M. Mao, and J. A. Halderman, “Internet censorship in China: Where does the filtering occur?,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, doi: 10.1007/978-3-642-19260-9_14.
- T. Zia, A. Zomaya, V. Varadharajan, and M. Mao, Security and Privacy in Communication Networks. 2013.
- M. V. Pawar and J. Anuradha, “Network security and types of attacks in network,” in Procedia Computer Science, 2015, doi: 10.1016/j.procs.2015.04.126.
- Symantec, “Internet security threat report,” 2016.
- Ishleen Kaur, Gagandeep Singh Narula, Ritika Wason, Vishal Jain and Anupam Baliyan, “Neuro Fuzzy—COCOMO II Model for Software Cost Estimation”, International Journal of Information Technology (BJIT), Volume 10, Issue 2, June 2018, page no. 181 to 187 having ISSN No. 2511-2104.
- Ishleen Kaur, Gagandeep Singh Narula, Vishal Jain, “Differential Analysis of Token Metric and Object Oriented Metrics for Fault Prediction”, International Journal of Information Technology (BJIT), Vol. 9, No. 1, Issue 17, March, 2017, page no. 93-100 having ISSN No. 2511-2104.
- Basant Ali Sayed Alia, Abeer Badr El Din Ahmedb, Alaa El Din Muhammad,El Ghazalic and Vishal Jain, "Incremental Learning Approach for Enhancing the Performance of Multi-Layer Perceptron for Determining the Stock Trend", International Journal of Sciences: Basic and Applied Research (IJSBAR), Jordan, page no. 15 to 23, having ISSN 2307-4531.
- RS Venkatesh, PK Reejeesh, S Balamurugan, S Charanyaa, “Further More Investigations on Evolution of Approaches for Cloud Security”, International Journal of Innovative Research in Computer and Communication Engineering , Vol. 3, Issue 1, January 2015
- K Deepika, N Naveen Prasad, S Balamurugan, S Charanyaa, “Survey on Security on Cloud Computing by Trusted Computer Strategy”, International Journal of Innovative Research in Computer and Communication Engineering, 2015
- P Durga, S Jeevitha, A Poomalai, M Sowmiya, S Balamurugan, “Aspect Oriented Strategy to model the Examination Management Systems”, International Journal of Innovative Research in Science, Engineering and Technology , Vol. 4, Issue 2, February 2015