Data Security in Local Networks Using Distributed Firewalls
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014

Data Security in Local Networks Using Distributed Firewalls

R. Maruthaveni, R. Latha

Today, computer and networking are inseparable. A number of confidential transactions occur very second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls. Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization. They provide virtually unlimited scalability. In addition, they overcome the single point-of-failure problem presented by the perimeter firewall. Distribute firewall solves these problems and protecting critical network end points where hackers want to penetrate. In this paper I am dealing with distributed firewall concepts, its evolution, its components, and the policies.

Keywords: Network Security, Policy Language, Certificate, Distributed Firewall

Edition: Volume 3 Issue 3, March 2014

Pages: 113 - 116

Share this Article

How to Cite this Article?

R. Maruthaveni, R. Latha, "Data Security in Local Networks Using Distributed Firewalls", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131048, Volume 3 Issue 3, March 2014, 113 - 116

Enter Your Registered Email Address





Similar Articles with Keyword 'Network Security'

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Downloads: 104 | Weekly Hits: ⮙5 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Share this Article

Similar Articles with Keyword 'Policy Language'

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 113 - 116

Data Security in Local Networks Using Distributed Firewalls

R. Maruthaveni, R. Latha

Share this Article

Downloads: 141 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 238 - 241

Approach of Data Security in Local Network Using Distributed Firewalls

J. Lavanya, R. V. Krishnaiah

Share this Article

Similar Articles with Keyword 'Certificate'

Downloads: 99 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Nigeria, Volume 7 Issue 8, August 2018

Pages: 1671 - 1677

Using Web Service for Generating Permanent Voter Cards (PVCs) for Nigerian Citizens

Anichebe Gregory Emeka

Share this Article

Downloads: 107 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1910 - 1915

RFID Enabled Secure Certificate

Sonali Singh

Share this Article

Downloads: 108 | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this Article

Downloads: 109 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2234 - 2237

A Secure Mobile Bill Payment (MOBILL) Service for M-Commerce

Pavuluri Gnana Ramakrishna, M. Chandra Naik

Share this Article

Similar Articles with Keyword 'Distributed Firewall'

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 113 - 116

Data Security in Local Networks Using Distributed Firewalls

R. Maruthaveni, R. Latha

Share this Article

Downloads: 124 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 801 - 806

Providing Security and Privacy in Cloud Computing Using Distributed Firewall and VPN

Dr. Chinthagunta Mukundha, Dr. I. Surya Prabha

Share this Article

Downloads: 127 | Weekly Hits: ⮙5 | Monthly Hits: ⮙16

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1623 - 1626

Detecting DOS Attacks in Software Defined Networking and Cloud Computing

Roniya Ssan Jacob, Dr. Kalimuthu.M

Share this Article

Downloads: 141 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 238 - 241

Approach of Data Security in Local Network Using Distributed Firewalls

J. Lavanya, R. V. Krishnaiah

Share this Article

Downloads: 144 | Weekly Hits: ⮙5 | Monthly Hits: ⮙15

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 654 - 658

Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall

Prajyoti P.Sabale, Anjali B. Raut

Share this Article



Top