Qualitative Analysis of Security Issues using Firewalls
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 2, February 2013

Qualitative Analysis of Security Issues using Firewalls

Piyush Kashiyani, Karthik Chawda

Technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the firewall. Unfortunately, designing and managing firewall policies are often error prone due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools. In this paper, we represent an innovative policy anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions. In particular, we articulate a grid-based representation technique, providing an intuitive cognitive sense about policy anomaly. In addition, we demonstrate how efficiently our approach can discover and resolve anomalies in firewall policies through rigorous experiments.

Keywords: access control, multilevel security, network security, security management, visualization tool

Edition: Volume 2 Issue 2, February 2013

Pages: 171 - 174

Share this Article

How to Cite this Article?

Piyush Kashiyani, Karthik Chawda, "Qualitative Analysis of Security Issues using Firewalls", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013401, Volume 2 Issue 2, February 2013, 171 - 174

88 PDF Views | 79 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'access control'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2990 - 2992

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Priyanka Padole, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Research Paper, Computer Science & Engineering, Nigeria, Volume 4 Issue 4, April 2015

Pages: 3158 - 3161

Vehicle License Plate Recognition Using Edge Detection and Neural Network

Arulogun Oladiran Tayo, Amusan Damilare Gideon

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1216 - 1220

Finger Vein Weightage Calculation of Imaginary Curve between Minutiae Points for Person Recognition

Reetika, Kiran Gupta

Share this Article

Similar Articles with Keyword 'network security'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Share this Article

Similar Articles with Keyword 'security management'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2526 - 2529

A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It

Rohini Divase, S. N. Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1536 - 1540

Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai, A. N. Patil

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 4 Issue 4, April 2015

Pages: 742 - 748

Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques

Ayad Mohammed Mahyoub Ghaleb, Samani A. Talab

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1893 - 1896

A Study on Critical Capabilities for Security Information and Event Management

Kavita Agrawal, Hemant Makwana

Share this Article

Similar Articles with Keyword 'visualization tool'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1284 - 1286

Customer Retention and Fraud Detection for Credit Card

Ajinkya Pathak, Rohan Aney, Soham Baheti

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 171 - 174

Qualitative Analysis of Security Issues using Firewalls

Piyush Kashiyani, Karthik Chawda

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 46 - 50

A Generic, Light ? Weight, Pluggable Data Transformation and Visualization Tool for XML to XML Transformation

Rahil A. Khera, P. S. Game

Share this Article
Top