An Effective Policy Anomaly Management Framework for Firewalls

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5

Abstract

Firewalls are devices or programs that control the flow of network traffic between hosts or networks that employ differing security postures. While firewalls are often discussed in the context of Internet connectivity, they may also have applicability in various other network environments. At one time, most firewalls were deployed at the network perimeters. This rovided some measure of protection for internal hosts, but it could not recognize all instances and forms of attacks, and attacks sent from one internal host to another often do not pass through network firewalls. Because of these and other factors network designers now often include firewall functionality at places other than the network perimeter to provide an additional layer of network security. Due to the increasing threat of network attacks, firewalls have become important integrated elements not only in the enterprise networks but also in small-size and home networks. Firewalls have been the frontier defense for secure networks against attacks and unauthorized traffic by filtering out unnecessary network traffic coming into or going from the secured network. In this paper, we represent an effective policy anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions.  

Authors and Affiliations

Akula Kumar, Syed Gouse

Keywords

Related Articles

Crack Detection of Ferromagnetic Materials through Non Destructive Testing Methodology

 The real components have so many defects in the material, which acts as a crack. In fact, manufacturing of a component is not ideal. In manufacturing several kinds of defects are generated like voids and inclusio...

 Experimental Investigation of Performance & Emission Characteristics of Diesel Engine Working On Diesel and NOME with Ethanol and Triacetin Blends

 This research presents effect of triacetin and ethanol as additive to biodiesel (Neem oil methyl ester) on the performance and emission characteristics of a diesel engine at different loads and constant engine spee...

 Aggrandize the Reliability by Bug Retrieval (ARBR)

A complex software system has numerous defect prone tasks. There are many reasons for the defects in software. Many of these defects lead to failure of software. Software Reliability is the probability of failure-free so...

 Distributed Utility-Based Energy Efficient Cooperative Medium Access Control in MANETS

 Cooperative communication, that utilizes near terminals to relay the overhearing information to grasp the variability gains, choices a nice potential to strengthen the transmission potency in wireless networks....

 Conversion of Artificial Neural Networks (ANN) To Autonomous Neural Networks

 Abstract: This article points out some serious drawbacks of Artificial Neural Networks, when compared to human brain.According to this article definitely there is a need for implementing Artificial Neural Networks...

Download PDF file
  • EP ID EP120870
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Akula Kumar, Syed Gouse (2013).  An Effective Policy Anomaly Management Framework for Firewalls. International Journal of Modern Engineering Research (IJMER), 3(5), 2916-2919. https://europub.co.uk/articles/-A-120870