A Survey paper: Data Security in Local Networks Using Distributed Firewalls
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 9
Abstract
Computer and Network security are the means of prevention and detection of unauthorized actions by users of computer system. The unauthorized action can be defined by the security policies which defines the security rules of a system. In most of the systems, the network security is achieved by firewall. A firewall is typically placed at the edge of a system and acts as a filter for unauthorized traffic. But there are some problems with these traditional firewalls like they rely on the notation of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, end-toend encryption problem and few more problems lead to the evolution of Distributed Firewalls. Distributed Firewall is a mechanism to enforce a network domain security policy through the use of a policy language, policy distribution scheme enabling policy control from a central point and certificates, enabling the identification of any member of the network policy domain. It secures the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network. They provide unlimited scalability and also they overcome the single point of failure problem presented by the perimeter firewall. In this paper I am dealing with distributed firewall concepts, its evolution, its components, and the policies.
Authors and Affiliations
Sneha Sahare , Mamta Joshi , Manish Gehlot
A Novel Document Clustering Algorithm Using Squared Distance Optimization Through Genetic Algorithms
K-Means Algorithm is most widely used algorithms in document clustering. However, it still suffer some shortcomings like random initialization, solution converges to local minima, and empty cluster formation. Genetic alg...
AGE CLASSIFICATIONS BASED ON SECOND ORDER IMAGE COMPRESSED AND FUZZY REDUCED GREY LEVEL (SICFRG) MODEL
One of the most fundamental issues in image classification and recognition are how to characterize images using derived features. Many texture classification and recognition problems in the literature usually require the...
SURVEY OF DIGITAL WATERMARKING USING DCT
Digital Watermarking is not a new name in the technology world but there are many new issues arise related with watermark. This paper surveys recent advances in watermarking techniques in digital images. The aim of digi...
PERFORMANCE ANALYSIS OF ADHOC ROUTING PROTOCOLS USING RANDOM WAYPOINT MOBILITY MODEL IN WIRELESS SENSOR NETWORKS
This paper investigates and undertakes simulation based study of adhoc routing protocols in wireless sensor networks. In this paper we have compared the performance of two routing protocol AODV and DSR by using random wa...
Performance of SIFT based Video Retrieval
Video has become an important element of multimedia computing and communication environments, with applications as varied as broadcasting, education, publishing and military intelligence. In Video Retrieval system, each...