Survey on Network Security, Threats & Firewalls
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
Network security is an important task that must be seriously considered when designing a network. It defined as the policies and procedures followed by a network administrator to protect the network devices from threats and simultaneously, the unauthorized users must be prevented from accessing the network. As the numbers of attacks are increasing day by day, it is necessary to explore the information regarding new attacks and take appropriate steps to safeguard the network from malicious attacks .This could be done with the help of firewalls that secure the network from the malicious attacks. Firewalls are nothing but are network devices that enforce an organizations security policy. Since their development, various methods have been used to implement firewalls. These methods filter network traffic at one or more of the seven layers of the ISO network model, most commonly at the application, transport, network, and data-link levels. Newer methods, which have not yet been widely adopted, include protocol normalization and distributed firewalls. Our main objective is to enhance the security in a network by performing various tasks in the network security process using firewalls. Here we discuss various type of network threats in network security approaches and their solution by the use of different firewalls phenomena.
Authors and Affiliations
Mr. Sachin Taluja , , Prof. Rajeshwar Lal Dua
Preventing SQL Injection Attacks Using Combinatorial Approach
SQL injection is a hazard to web applications, which gives attackers unrestricted access to the database. The attacker thereby can supply malicious or corrupted input that compromises an application. This leads to...
Low and mid-level features for target detection in satellite images
Reliably detecting objects in broadarea overhead or satellite images has become an increasingly pressing need, as the capabilities for image acquisition are growing rapidly. The problem is particularly difficult in...
E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept
An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are many security challenges associated with the use of Inter...
Comparison of Modern Denoising Algorithms
Integrity of edge and detail information associated with the original images play an important role in applications. Images acquired from sensors, transmission errors and lossy compression contains noise and it is...
Investigation of SAR inside Different Enclosures and Reduction Techniques
Electromagnetic interface with a human head exposed to internal antenna is calculated. A human head phantom with dielectric properties inside an enclosure is designed. The radiation pattern of Planar Inverted F An...