A Comparative Study of Firewall and Intrusion Prevention System
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 6
Abstract
In the real world a firewall is a solid barrier between a precious asset on one side and a hazard on the other. Firewalls are often used to protect an organization from hazards on the Internet but they can, and probably should, also be used within an organization to separate different departments, working areas or networks. Locked offices and buildings cannot protect information if the computers holding it are open to everybody on the network. Firewall has many shortages, such as it cannot keep away interior attacks, it cannot provide a consistent security strategy, and it has a single bottleneck spot and invalid spot, etc. The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Intrusion Prevention Systems (IPS) evolved after that to resolve ambiguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers.IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do.
Authors and Affiliations
Mr D. Shiva rama krishna, Mr K. Siva Rama Prasad, Mr Ch. v. v. Narasimha Raju
Comparative Analysis of Energy Cost of Sequential and Parallel Cryptographic Algorithms on Different Platforms
Cell phones, smart cards, and health monitoring gadgets are just a few examples of the numerous battery-powered embedded systems utilized to access, alter, and store sensitive and complicated data today. Users are concer...
IMAGE ENCRYPTION USING HILBERT SPACE FILLING CURVE AND HENON MAP
A proficient but a simple selective image encryption method is suggested based on Hilbert space filling curve, Region of interest, non-linear chaotic map. The main essence of the suggested scheme is to change the pixel p...
A Review on Machine Learning and Its Applications
Learning is the most important aspect of human intellect and the most fundamental method of acquiring information. Machine learning is the most basic method for making a machine intelligent. Application Data has grown in...
The Functioning of a Voltage Transformer In Relation To Power Quality
Conductive expansions in the giving voltage might affect the root mean square voltage and the situation with the voltage twist on the mains, bringing about power quality debasement. The motivation behind this exploration...
Automated Waves Files Splitting
The ASS (Automatic Speech Segmentation) Technique is used in this article to segment spontaneous speech into syllable-like units. The segmentation of the acoustic signal into syllabic units is an essential step in the co...