International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 162 | Views: 193

Research Paper | Computer Science & Engineering | India | Volume 7 Issue 3, March 2018

FireMAN: Next Generation Firewall Systems Design using Data Mining

Nareshkumar D. Harale [2] | Dr. B. B. Meshram [2]

Abstract: Network security is main issue of this generation of computing because cyber-attacks are increasing day by day in terms diversity and complexity. Establishing a network is not a big issue for network administrators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper mainly emphasize on the network security also we present some major issues that can affect our network. Also key objective is to build a comprehensive firewall that can secure a computer from outside threat, monitor data that flows into, filter if objectionable and forward if it pertains to the set standards and polices. The user should be able to set various policies for filtering without having to go into the details of its implementation. Also, the user should be having administrative privileges, so as to safeguard the integrity of the system. The defined rules are applied on the packets and its contents flowing into and outside the system In addition to this, the firewall should implement filtering of data at the application level. Also a port scanning utility would be an added advantage in determining the various intrusion attempts into the computing systems. Meanwhile, stress should be given on the ease of use and user friendliness of the system.

Keywords: Network Attacks, Network Intrusion, Port Scanning, Intrusion Protection, Data Mining, Firewall Systems, Packet Filtering, Data Filtering, Network Security

Edition: Volume 7 Issue 3, March 2018,

Pages: 629 - 642

How to Download this Article?

Type Your Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait