Implementing Firewall using IP Tables in Linux
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2016, Vol 3, Issue 3
Abstract
The booming complexity of networks, and the desire to make them more accessible due to the growing emphasis on and awareness of the Internet as a medium for multi-dimensional transactions, mean that networks are becoming constantly and increasingly exposed to attacks, internal and external. The research is on for mechanisms and techniques for the security of internal networks from such attacks. One of the multiple protective mechanisms under detailed consideration is the firewall. A firewall protects a network by guarding the points of entry to it. Firewalls are becoming increasingly effective and sophisticated by the day, and new features are constantly being added, so that, in spite of the criticisms made of them and r&d trends threatening them, they are still a very strong protective mechanism. This article provides an overview of firewall using IP tables in Linux.
Authors and Affiliations
Prof. Kinjal Joshi
A Fuzzy Mathematical Model to Find the Problems Faced by Gypsies in Tamilnadu
In this research paper, the authors investigate about the problem faced by Gypsis in Tamil Nadu using Fuzzy Cognitive maps. In 1986, Bart Kosko introduced the FCM and its properties. Fuzzy Cognitive maps are more applica...
Security Considerations in Wireless Ad-hoc Networks Using Commitment Schemas
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for...
Leveraging Mobility in Resolving Customer Complaints Electronically
How businesses resolve customer complaining behaviour effectively has been considered a “defensive marketing” strategy or a “zero-defections” strategy, which diminishes customer dissatisfaction. Handling customer dissati...
Role of Consumer Protection Act, 1986 in Protecting the Consumers
Consumers are the largest economic group in any country. They are the central point of all economic activity. Everyone is a born consumer, whether he is an industrialist, a producer, a trader engaged in any profession or...
Remote Adaptive Sensing Based Malicious Node Detection and Security in MANET’S
The technology of networks is shifted to non-wired networks which are widely accepted in the recent years. Addition of components to the wireless network a varied uses in many areas and one such use is found in mobile ad...