Security Issues of Firewall

A R. Pon Periyasamy

Abstract


The need of Network Security is accelerating at the same pace as that of increased Internet usage. Network Security prevents from illegitimate admittance, hacking andauthentic data transportation. Network Security consist of provisions and policies adopted by a network administrator to preclude and monitor unauthorized access, alterations, perversion, declination of a computer network and network-accessible resources. Network Security is achieved by Firewall. Firewall is a   hardware or software device which is designed to permit or refuse network transmissions based upon certain protocols. Firewall is a locus at the endpoints of the system which strains out all illegitimate traffic and users. But conventional or traditional firewalls rely stricly on the restricted topology and restrained entry points to function; which results in difficulty in filtering certain protocols, end-to-end encryption problem etc. Hence, it resulted in the evolution of Distributed Firewall which strengthens the network security policies without delimitating its topology from inside or outside. Distributed Firewall is a host-resident security software application that protects the enterprise network’s servers and end-user machines against unwanted intrusion. This paper is a literature review paper focusing on traditional firewalls, it evolution, security issues various policies and the concept of distributed firewall.

References


Kahate, A. Cryptography and Network Security. ISBN-13: 978-0-07-064823-4, ISBN-10:0-07-64823-9, McGraw Hill Higher Education.

Forouzan, B. A., & Mukhopadhyay, D. Cryptography and Network Security. ISBN-13:978-0- 07-70208-0, ISBN-10: 0-07- 070208-X, Mc Graw Hill Higher Education.

Stallings, W. Cryptography and Network Security Principles and Practices. ISBN-978-81-775-8774-6.

Tanenbaum, A. S., Watherall, D. J. Computer Networks. ISBN- 13: 978-0132126953, ISBN-10: 0132126958, 5th Edition, Paperback, 2010, pp: 34-39.

Rathod, R.H., & Deshmukh, Prof. V.M. (2013). Role of Distributed Firewalls in Local Network for Data Security. International Journal of Computer Science and Applications, Vol. 6, No. 2, Apr 2013, ISSN: 0974-011 (open access), pp: 360- 364.Retrieved from official website: www.researchpublications.org

Zeng-gang, X., & Xue-min, Z. (2010). Research and Design on distributed Firewall based on LAN. Computer and Automation Engineering (ICCAE), 2010, E-ISBN: 978-1-4244-5586-7, Print ISBN: 978-1-4244-5585-0, INSPEC Accession Number: 11259785, DOI: 10.1109/ICCAE.2010.5451596, Publisher: IEEE, Singapore, pp: 517-520

Patel, H. B., Patel, R. S., & Patel, J. A. (2011). Approach of Data Security in Local Network using Distributed Firewalls. International Journal of P2P Network Trends and Technology(IJPTT), Vol. 1 Issue 3- 2011, ISSN: 2249-2615, pp: 26-29. Retrieved from: http://www.internationaljournalssrg.org

Avolio, F. Firewalls and Internet Security, the Second Hundred (Internet) Years. The Internet Protocol Journal, Vol. 2, No. 2.Retrieved from official website of CISCO: http://www.cisco.com/web/about/ac123/ac147/ac174/ac200/about_cisco_ipj_archive_article09186a00800c85ae.html

Sahare, S., Joshi, M., & Gehlot, M. (2012). A Survey Paper: Data Security in Local Networks Using Distributed Firewalls.International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 9 Sep 2012, ISSN: 0975-3397, pp: 1617-1622.

Gaud, J.V., & Bartere, M.M. (2014). Data Security Based on LAN Using Distributed Firewall. International Journal of Computer Science and Mobile Computing (IJCSMC), Vol. 3, Issue. 3, March 2014, ISSN pp: 386-391.Retrieved from IJCSMC official website:www.ijcsmc.com

Bhovare, S. R., & Chaudhari, B. K. (2014). A Survey on Data Security Provided in Local Network Using Distributed Firewall. International Journal of Research in Advent Technology, Vol. 2, No. 4, April 2014, E-ISSN: 2321-9637, pp: 169-171.

Warade, S. J., Tijare, P. A., & Sawalkar, S. N. (2014). Data Security in Local Network using Distributed Firewall: A Review. International Journal of Computer Applications (0975-8887), National Conference on Emerging Trends in Computer Technology (NCETCT-2014), pp: 19-21.

(2009) Wikipedia. [Online]. Available:https://en.wikipedia.org/wiki/Distributed_firewall.

S. Tom. Networking defined & Hyperlinked. [Online]. Available:www.linktionary.com/c/circ_firewall.html

Marcus J. Ranum (1997). [Online]. Available:www.ranum.com/security/computer_security/archives/ internet-attacks.pdf

Security Attacks. [Online]. Available: http://www.comptechdoc.org/independent/security/recommendatio ns/secattacks.html




DOI: https://doi.org/10.23956/ijarcsse/V7I4/0208

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.