Research Article | Open Access | Download PDF
Volume 1 | Issue 3 | Year 2011 | Article Id. IJPTT-V1I3P405 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I3P405Approach of Data Security in Local Network using Distributed Firewalls
Hiral B.Patel, Ravi S.Patel, Jayesh A.Patel
Citation :
Hiral B.Patel, Ravi S.Patel, Jayesh A.Patel, "Approach of Data Security in Local Network using Distributed Firewalls," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 3, pp. 18-21, 2011. Crossref, https://doi.org/10.14445/22492615/IJPTT-V1I3P405
Abstract
Firewall is a device or set of instruments
designed to permit or deny network transmissions based upon a set of rules and
regulation is frequently used to protect networks from unauthorized access
while permitting legitimate communications to pass or during the sensitive data
transmission. Distributed firewalls allow enforcement of security policies on a
network without restricting its topology on an inside or outside point of view.
Use of a policy language and centralized delegating its semantics to all members
of the networks domain support application of firewall technology for
organizations, which network devices communicate over insecure channels and
still allow a logical separation of hosts in- and outside the trusted domain.
We introduce the general concepts of such distributed firewalls, its
requirements and implications and introduce its suitability to common threats
on the Internet, as well as give a short discussion on contemporary
implementations.
Keywords
Network Security, Security Policy, Pull technique, Push technique, Policy distribution
References
[1] http://www.seminarprojects.com/Thread-data-security-inlocal-network-using-distributed-firewalls
[2] http://en.wikipedia.org
[3] Bellovin, S. M. 1999. Distributed Firewalls.
[4] Gatus, G. E. P., Safavi-Naini, R. and Willy Susilo. 2004.
Policy Distribution Using COPSPR in a Distributed Firewall.
In Australian Telecommunication Networks and Applications
Conference.
[5] Li, Wei. 2000. Distributed Firewall. GeoInformatica.
4(3):253
[6] Oguzhan ÇAKI, March 2008 ,Thesis on “ACCESS
MONITORING SYSTEM FOR DISTRIBUTED
FIREWALL POLICIES”
[7] Robert Stepanek, Distributed Firewalls In Article In T110.501 Seminar on Network security 2001.
[8] Yunus ERDOĞAN, November 2008, Thesis on
“DEVELOPMENT OF A DISTRIBUTED FIREWALL
ADMINISTRATION TOOL”