Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Policy Optimization and Anomaly Detection of Firewall
Akshay Dattatray Kachare, Geeta Atkar
Firewalls are core entity in network security. Though, management of firewall rules/policies, mainly in multiple firewall enterprise networks, has grown to be a complex and error-prone task. A firewall always checks every incoming or outgoing packet to decide which packet should be accept or discard based on its policy. To avoid policy anomalies, it must be consider that firewall filtering rules must be written, well-organized and distributed suspiciously. These firewall policy anomalies might cause network vulnerability. Hence, insertion or modification of filtering rules in every firewall requires thorough intra-firewall and inter-firewall analysis. This analysis determines the correct rule position and order in the firewalls. In this paper, firstly, identification of all anomalies which may exist in a single or multiple firewall environments is addressed with various anomaly detection techniques. Secondly, this paper describes the cross-domain privacy-preserving protocol for cooperative firewall policy optimization. Specially, for several two neighbouring firewalls belonging to two different administrative domains, protocol which is define in this paper may identify in every firewall policies that can be eliminated because of the another firewall.
Keywords: firewall optimization, anomaly detection, privacy preservation
Edition: Volume 4 Issue 7, July 2015
Pages: 1006 - 1010
How to Cite this Article?
Akshay Dattatray Kachare, Geeta Atkar, "Policy Optimization and Anomaly Detection of Firewall", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156162, Volume 4 Issue 7, July 2015, 1006 - 1010
124 PDF Views | 103 PDF Downloads
Similar Articles with Keyword 'firewall optimization'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1982 - 1985Review: Firewall Privacy Preservation By Packet Filtering Management
Akshay Dattatray Kachare, Geeta Atkar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2990 - 2992A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)
Priyanka Padole, Purnima Selokar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1006 - 1010Policy Optimization and Anomaly Detection of Firewall
Akshay Dattatray Kachare, Geeta Atkar
Similar Articles with Keyword 'anomaly detection'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2011 - 2014Attack Detection and Mitigation for AGC
Pooja A Kulkarni, Harshal A Karande
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 984 - 986Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems
Vrushali G. Chabilwad, A. D. Gujar
Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 12, December 2017
Pages: 1547 - 1551Attack Detection Based on Data Mining Techniques
Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1825 - 1828Link-Anomaly Detection in Twitter Streams
Shari P S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1494 - 1496Survey of Novel Process for Domain Adaptation and Cost Sensitive Online Classification in Data Mining
Ashish. S. Kale, S. P. Kosbatwar
Similar Articles with Keyword 'privacy preservation'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 118 - 125Advanced Unsupervised Anonymization Technique in Social Networks for Privacy Preservation
Anjali R Kulkarni, Yogish H K
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1982 - 1985Review: Firewall Privacy Preservation By Packet Filtering Management
Akshay Dattatray Kachare, Geeta Atkar