International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014


Data Security in Local Networks Using Distributed Firewalls

R. Maruthaveni [2] | R. Latha [12]


Abstract: Today, computer and networking are inseparable. A number of confidential transactions occur very second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls. Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization. They provide virtually unlimited scalability. In addition, they overcome the single point-of-failure problem presented by the perimeter firewall. Distribute firewall solves these problems and protecting critical network end points where hackers want to penetrate. In this paper I am dealing with distributed firewall concepts, its evolution, its components, and the policies.


Keywords: Network Security, Policy Language, Certificate, Distributed Firewall


Edition: Volume 3 Issue 3, March 2014,


Pages: 113 - 116


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

R. Maruthaveni, R. Latha, "Data Security in Local Networks Using Distributed Firewalls", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 113-116, https://www.ijsr.net/get_abstract.php?paper_id=20131048

Similar Articles with Keyword 'Network Security'

Downloads: 0

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey [8]

Share this Article

Downloads: 7 | Weekly Hits: ⮙7 | Monthly Hits: ⮙7

Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024

Pages: 882 - 886

Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation

Manupreet Kaur

Share this Article
Top