Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 145 , Downloads: 139 | CTR: 96 % | Weekly Popularity: ⮙3

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 9, September 2013

Approach of Data Security in Local Network Using Distributed Firewalls

J. Lavanya, R. V. Krishnaiah

Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security policies on a network without restricting its topology on an inside or outside point of view. Use of a policy language and centralized delegating its semantics to all members of the networks domain support application of firewall technology for organizations, which network devices communicate over insecure channels and still allow a logical separation of hosts in- and outside the trusted domain. We introduce the general concepts of such distributed firewalls, its requirements and implications and introduce its suitability to common threats on the Internet, as well as give a short discussion on contemporary implementations.

Keywords: Network Security, Security Policy, Pull technique, Push technique, Policy distribution

Edition: Volume 2 Issue 9, September 2013

Pages: 238 - 241

Share this Article

How to Cite this Article?

J. Lavanya, R. V. Krishnaiah, "Approach of Data Security in Local Network Using Distributed Firewalls", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=07091302, Volume 2 Issue 9, September 2013, 238 - 241

145 PDF Views | 139 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network Security'

Views: 133 , Downloads: 100 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Views: 133 , Downloads: 100 | CTR: 75 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Views: 126 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Views: 146 , Downloads: 103 | CTR: 71 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'Security Policy'

Views: 135 , Downloads: 106 | CTR: 79 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 873 - 877

Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM

Shital Kuber, Prof. Digambar Padulkar

Share this Article

Views: 145 , Downloads: 110 | CTR: 76 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2128 - 2130

A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique

Rasal Swati A., Pawar B. V.

Share this Article

Views: 123 , Downloads: 111 | CTR: 90 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 5 Issue 2, February 2016

Pages: 1972 - 1974

The Network Security Policies of Telecommunication Industries in Sudan

Mohammed Ibrahim M. Gali, Dr. Abdelrahman Elsharif Karrar

Share this Article

Views: 148 , Downloads: 136 | CTR: 92 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 243 - 246

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Share this Article

Views: 145 , Downloads: 139 | CTR: 96 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 238 - 241

Approach of Data Security in Local Network Using Distributed Firewalls

J. Lavanya, R. V. Krishnaiah

Share this Article
Top