Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 9, September 2013

Approach of Data Security in Local Network Using Distributed Firewalls

J. Lavanya, R. V. Krishnaiah

Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security policies on a network without restricting its topology on an inside or outside point of view. Use of a policy language and centralized delegating its semantics to all members of the networks domain support application of firewall technology for organizations, which network devices communicate over insecure channels and still allow a logical separation of hosts in- and outside the trusted domain. We introduce the general concepts of such distributed firewalls, its requirements and implications and introduce its suitability to common threats on the Internet, as well as give a short discussion on contemporary implementations.

Keywords: Network Security, Security Policy, Pull technique, Push technique, Policy distribution

Edition: Volume 2 Issue 9, September 2013

Pages: 238 - 241

Share this Article

How to Cite this Article?

J. Lavanya, R. V. Krishnaiah, "Approach of Data Security in Local Network Using Distributed Firewalls", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=07091302, Volume 2 Issue 9, September 2013, 238 - 241

91 PDF Views | 78 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network Security'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Similar Articles with Keyword 'Security Policy'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2128 - 2130

A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique

Rasal Swati A., Pawar B. V.

Share this Article

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 5 Issue 2, February 2016

Pages: 1972 - 1974

The Network Security Policies of Telecommunication Industries in Sudan

Mohammed Ibrahim M. Gali, Dr. Abdelrahman Elsharif Karrar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 873 - 877

Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM

Shital Kuber, Prof. Digambar Padulkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 238 - 241

Approach of Data Security in Local Network Using Distributed Firewalls

J. Lavanya, R. V. Krishnaiah

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 243 - 246

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Share this Article
Top