CDPP: Inter firewall Rules Redundancy Detection In Firewall
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Firewalls playing very important role to provide security to private networks and organizations. . But the firewall policies cannot be communal across domains because it contains confidential information and security holes also, which leads to various attacks by attacker. In this project, we propose the cross-domain privacy- preserving cooperative firewall policy optimization protocol and a rule-based segmentation technique. Specifically, for any two adjacent firewalls belonging to two different administrative domains, our protocol can identify in each firewall the rules that can be removed because of the other firewall. The optimization process involves cooperative computation between the two firewalls without any party disclosing its policy to the other but firewall mainly depends on the quality of policy configured in the firewall. Designing and managing firewall policies are often difficult due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools. A rule-based segmentation technique to identify policy anomalies and provide effective anomaly resolutions.
Authors and Affiliations
K Jyoyhirmayi, Sadineni Neelima
An approach of Regression testing for Service Oriented Architecture
Service Oriented Architecture (SOA) is an application architecture in which services are described using a description language. It has changed the way business enterprises with technology with a very fast demand of r...
Design of Reversible Mod-16 Synchronous Counter
Reversible logic is very important in lowpower circuit design and quantum computing. And also Reversible logic is gaining interest in the recent past Due to its less heat dissipating characteristics. A lot of researc...
Fast Retrieval Of Unstructured Documents By Using Meta Data And Hierarchical Clustering
Several annotation systems let only “un typed” keyword annotation. For illustration, a user may interpret a weather report using a tag. There are several application domains where users make and contribute to informa...
A New Dynamic Privacy Grid Mechanism for Location Based Services
Appropriate to the nature of the data being swap over between the user and the server, the common changing of the user’s name provides modest shield for the user’s privacy. A more recent investigation of the mix-zone...
Recent Issues and Its Quick Fixes for Various Data Repositories
The aim of this study was to assess the issues and their quick fixes of databases. But the database accuracy has a trickle down effect in most implementations. This paper proposes the overall guidance about the techni...