International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 9, September 2013

Approach of Data Security in Local Network Using Distributed Firewalls

J. Lavanya, R. V. Krishnaiah

Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security policies on a network without restricting its topology on an inside or outside point of view. Use of a policy language and centralized delegating its semantics to all members of the networks domain support application of firewall technology for organizations, which network devices communicate over insecure channels and still allow a logical separation of hosts in- and outside the trusted domain. We introduce the general concepts of such distributed firewalls, its requirements and implications and introduce its suitability to common threats on the Internet, as well as give a short discussion on contemporary implementations.

Keywords: Network Security, Security Policy, Pull technique, Push technique, Policy distribution

Edition: Volume 2 Issue 9, September 2013

Pages: 238 - 241


How to Cite this Article?

J. Lavanya, R. V. Krishnaiah, "Approach of Data Security in Local Network Using Distributed Firewalls", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=07091302, Volume 2 Issue 9, September 2013, 238 - 241

24 PDF Views | 22 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network Security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2762 - 2766

Large Scale Data Shared by Peer to Peer Based System in Shared Network

Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1289 - 1292

CARV System ? Cryptographic Algorithms Representing Visually System

Pyarimol Nair, Neethu Krishnan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 964 - 968

Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Sajjade Zeba-Shazesh, Aruna K. Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this article

Similar Articles with Keyword 'Security Policy'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 873 - 877

Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM

Shital Kuber, Prof. Digambar Padulkar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2128 - 2130

A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique

Rasal Swati A., Pawar B. V.

Share this article

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 5 Issue 2, February 2016

Pages: 1972 - 1974

The Network Security Policies of Telecommunication Industries in Sudan

Mohammed Ibrahim M. Gali, Dr. Abdelrahman Elsharif Karrar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 238 - 241

Approach of Data Security in Local Network Using Distributed Firewalls

J. Lavanya, R. V. Krishnaiah

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 243 - 246

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Share this article

Top