Survey on Network Security, Threats & Firewalls  

Abstract

Network security is an important task that must be seriously considered when designing a network. It defined as the policies and procedures followed by a network administrator to protect the network devices from threats and simultaneously, the unauthorized users must be prevented from accessing the network. As the numbers of attacks are increasing day by day, it is necessary to explore the information regarding new attacks and take appropriate steps to safeguard the network from malicious attacks .This could be done with the help of firewalls that secure the network from the malicious attacks. Firewalls are nothing but are network devices that enforce an organizations security policy. Since their development, various methods have been used to implement firewalls. These methods filter network traffic at one or more of the seven layers of the ISO network model, most commonly at the application, transport, network, and data-link levels. Newer methods, which have not yet been widely adopted, include protocol normalization and distributed firewalls. Our main objective is to enhance the security in a network by performing various tasks in the network security process using firewalls. Here we discuss various type of network threats in network security approaches and their solution by the use of different firewalls phenomena.  

Authors and Affiliations

Mr. Sachin Taluja , , Prof. Rajeshwar Lal Dua

Keywords

Related Articles

Preventing SQL Injection Attacks Using Combinatorial Approach 

SQL injection is a hazard to web applications, which gives attackers unrestricted access to the database. The attacker thereby can supply malicious or corrupted input that compromises an application. This leads to...

Low and mid-level features for target detection in satellite images 

Reliably detecting objects in broadarea overhead or satellite images has become an increasingly pressing need, as the capabilities for image acquisition are growing rapidly. The problem is particularly difficult in...

E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept

An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are many security challenges associated with the use of Inter...

Comparison of Modern Denoising Algorithms 

Integrity of edge and detail information associated with the original images play an important role in applications. Images acquired from sensors, transmission errors and lossy compression contains noise and it is...

Investigation of SAR inside Different Enclosures and Reduction Techniques 

Electromagnetic interface with a human head exposed to internal antenna is calculated. A human head phantom with dielectric properties inside an enclosure is designed. The radiation pattern of Planar Inverted F An...

Download PDF file
  • EP ID EP87806
  • DOI -
  • Views 163
  • Downloads 0

How To Cite

Mr. Sachin Taluja, , Prof. Rajeshwar Lal Dua (2012). Survey on Network Security, Threats & Firewalls  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(7), 53-58. https://europub.co.uk/articles/-A-87806