Policy Optimization and Anomaly Detection of Firewall
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Policy Optimization and Anomaly Detection of Firewall

Akshay Dattatray Kachare, Geeta Atkar

Firewalls are core entity in network security. Though, management of firewall rules/policies, mainly in multiple firewall enterprise networks, has grown to be a complex and error-prone task. A firewall always checks every incoming or outgoing packet to decide which packet should be accept or discard based on its policy. To avoid policy anomalies, it must be consider that firewall filtering rules must be written, well-organized and distributed suspiciously. These firewall policy anomalies might cause network vulnerability. Hence, insertion or modification of filtering rules in every firewall requires thorough intra-firewall and inter-firewall analysis. This analysis determines the correct rule position and order in the firewalls. In this paper, firstly, identification of all anomalies which may exist in a single or multiple firewall environments is addressed with various anomaly detection techniques. Secondly, this paper describes the cross-domain privacy-preserving protocol for cooperative firewall policy optimization. Specially, for several two neighbouring firewalls belonging to two different administrative domains, protocol which is define in this paper may identify in every firewall policies that can be eliminated because of the another firewall.

Keywords: firewall optimization, anomaly detection, privacy preservation

Edition: Volume 4 Issue 7, July 2015

Pages: 1006 - 1010

Share this Article

How to Cite this Article?

Akshay Dattatray Kachare, Geeta Atkar, "Policy Optimization and Anomaly Detection of Firewall", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156162, Volume 4 Issue 7, July 2015, 1006 - 1010

Enter Your Email Address




Similar Articles with Keyword 'firewall optimization'

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1982 - 1985

Review: Firewall Privacy Preservation By Packet Filtering Management

Akshay Dattatray Kachare, Geeta Atkar

Share this Article

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2990 - 2992

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Priyanka Padole, Purnima Selokar

Share this Article

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1006 - 1010

Policy Optimization and Anomaly Detection of Firewall

Akshay Dattatray Kachare, Geeta Atkar

Share this Article

Similar Articles with Keyword 'anomaly detection'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Downloads: 108 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1496 - 1500

An Intrusion Detection Model for Detecting Type of Attack Using Data Mining

Amruta Surana, Shyam Gupta

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1676 - 1682

Identifying Emerging Topics Using Link Anomaly Detection in Social Media

Shweta V. Saswade, Prof. S. S. Nandgaonkar

Share this Article

Downloads: 111

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1207 - 1210

Out Lier Detection and Clustering Analysis in Data Stream Classification

Neethu S, Sajni Nirmal

Share this Article

Similar Articles with Keyword 'privacy preservation'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2144 - 2147

Survey on Privacy Preservation in Content Based Information Retrieval

Bhagyashree V. Khapli, Manjushri A. Mahajan

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1358 - 1361

A Survey on Privacy Preservation and sharing Data Securely in Cloud Storage

Manoj. S. Tore, S. K. Sonkar

Share this Article



Top