Implementing Firewall using IP Tables in Linux

Abstract

The booming complexity of networks, and the desire to make them more accessible due to the growing emphasis on and awareness of the Internet as a medium for multi-dimensional transactions, mean that networks are becoming constantly and increasingly exposed to attacks, internal and external. The research is on for mechanisms and techniques for the security of internal networks from such attacks. One of the multiple protective mechanisms under detailed consideration is the firewall. A firewall protects a network by guarding the points of entry to it. Firewalls are becoming increasingly effective and sophisticated by the day, and new features are constantly being added, so that, in spite of the criticisms made of them and r&d trends threatening them, they are still a very strong protective mechanism. This article provides an overview of firewall using IP tables in Linux.

Authors and Affiliations

Prof. Kinjal Joshi

Keywords

Related Articles

A Fuzzy Mathematical Model to Find the Problems Faced by Gypsies in Tamilnadu

In this research paper, the authors investigate about the problem faced by Gypsis in Tamil Nadu using Fuzzy Cognitive maps. In 1986, Bart Kosko introduced the FCM and its properties. Fuzzy Cognitive maps are more applica...

Security Considerations in Wireless Ad-hoc Networks Using Commitment Schemas

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for...

Leveraging Mobility in Resolving Customer Complaints Electronically

How businesses resolve customer complaining behaviour effectively has been considered a “defensive marketing” strategy or a “zero-defections” strategy, which diminishes customer dissatisfaction. Handling customer dissati...

Role of Consumer Protection Act, 1986 in Protecting the Consumers

Consumers are the largest economic group in any country. They are the central point of all economic activity. Everyone is a born consumer, whether he is an industrialist, a producer, a trader engaged in any profession or...

Remote Adaptive Sensing Based Malicious Node Detection and Security in MANET’S

The technology of networks is shifted to non-wired networks which are widely accepted in the recent years. Addition of components to the wireless network a varied uses in many areas and one such use is found in mobile ad...

Download PDF file
  • EP ID EP243431
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Prof. Kinjal Joshi (2016). Implementing Firewall using IP Tables in Linux. International journal of Emerging Trends in Science and Technology, 3(3), 3634-3637. https://europub.co.uk/articles/-A-243431