International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 137 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 2, February 2013


Qualitative Analysis of Security Issues using Firewalls

Piyush Kashiyani | Karthik Chawda


Abstract: Technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the firewall. Unfortunately, designing and managing firewall policies are often error prone due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools. In this paper, we represent an innovative policy anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions. In particular, we articulate a grid-based representation technique, providing an intuitive cognitive sense about policy anomaly. In addition, we demonstrate how efficiently our approach can discover and resolve anomalies in firewall policies through rigorous experiments.


Keywords: access control, multilevel security, network security, security management, visualization tool


Edition: Volume 2 Issue 2, February 2013,


Pages: 171 - 174

Qualitative Analysis of Security Issues using Firewalls


How to Cite this Article?

Piyush Kashiyani, Karthik Chawda, "Qualitative Analysis of Security Issues using Firewalls", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=IJSRON2013401, Volume 2 Issue 2, February 2013, 171 - 174, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'access control'

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata | Eugene Mbuyi Mukendi | Jean-Didier Batubenga

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant | Hingoliwala H. A.

Share this Article


Top