International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 217

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014 | Rating: 6.3 / 10


Data Security in Local Networks Using Distributed Firewalls

R. Maruthaveni [2] | R. Latha [13]


Abstract: Today, computer and networking are inseparable. A number of confidential transactions occur very second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls. Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization. They provide virtually unlimited scalability. In addition, they overcome the single point-of-failure problem presented by the perimeter firewall. Distribute firewall solves these problems and protecting critical network end points where hackers want to penetrate. In this paper I am dealing with distributed firewall concepts, its evolution, its components, and the policies.


Keywords: Network Security, Policy Language, Certificate, Distributed Firewall


Edition: Volume 3 Issue 3, March 2014,


Pages: 113 - 116


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top