CFP last date
20 January 2025
Reseach Article

Automation the Process of Unifying the Change in the Firewall Performance

by Kirandeep Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 11
Year of Publication: 2017
Authors: Kirandeep Kaur
10.5120/ijca2017913545

Kirandeep Kaur . Automation the Process of Unifying the Change in the Firewall Performance. International Journal of Computer Applications. 164, 11 ( Apr 2017), 42-45. DOI=10.5120/ijca2017913545

@article{ 10.5120/ijca2017913545,
author = { Kirandeep Kaur },
title = { Automation the Process of Unifying the Change in the Firewall Performance },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 11 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number11/27531-2017913545/ },
doi = { 10.5120/ijca2017913545 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:11:05.826517+05:30
%A Kirandeep Kaur
%T Automation the Process of Unifying the Change in the Firewall Performance
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 11
%P 42-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid growth of internet leads to increase in the number of attacks resulting in malicious data to enter in the system. Firewall is introduced so as to resist from the attacks. Anomalies are being generated as rules that are defined may result in conflicts. For that reason an effective anomaly detection and resolution approach is needed and after resolving conflicts, the rules can be reordered dynamically that improve the efficiency of anomaly management framework. Firewall log analysis has been done and then from that analysis primitive rules are defined. They planned the safety policy found on the rules described by the network administrator that decided which packet can be passed to an organizations private network. In addition, analyze the content of the logged data to detect the irrelevant behavior. The logs showing irrelevant behavior are blocked with the access so as to add more security to the network.

References
  1. ASARCIKLI,s.(october 2005). firewall monitoring using intrusion detection system.
  2. Design and implementation of content firewall. (n.d.). university of wollongong , 13
  3. Gawanmeh, A. (2014). automatic verification of security policies in firewalls with dynamic rule sequence. internation conference on information systems , 6.
  4. Inc, d. s. (2012). Introduction to Firewall . intelligent edu.com , p. 4.
  5. kakuru, S. (2011). behavior based network traffic analysis tool. IEEE , 4.
  6. Kavitha karun A, l. k. (2013). Firewall log analysis and dynamic rule re-ordering in firewall policy anomaly management. IEEE , 4.
  7. Kazimierz Kowalski, M. B. (2006). Analysis of Log files Intersections for security Enhancement. IEEE , 5.
  8. kumar, s. (2012-14). Firewall. techno sticker .
  9. Lubana k, R. c. (2013). A study on firewall policy anomaly representation techniques. ijarcce , 4.
  10. Mukupa, I. M. (November 8, 2010). firewall rule set optimization. In firewall rule set optimization (p. 90). Grahamstown, South Africa.
  11. R.sherman. (2000). computer security.
  12. Rupali chaure, s. k. (2010). firewall anomaly detection and removal techniques. IEEE , 4.
  13. Sandip k pal, m. a. (2014). User based behavior anomaly detection. integrity learning responsibility.
  14. search, d. (2012). different types of attacks. intelligent edu.com , p. 3.
  15. Schuba, C. L. (December 1997). modelling,design and implementation of firewall technology. Purdue University.
  16. Teddy Mantoro, N. A. (2013). Log Visualization of Intrusion and Prevention Reverse Proxy Server Against Web attacks. ieee , 5.
Index Terms

Computer Science
Information Sciences

Keywords

Policy anomaly Firewall Firewall log analysis Internet Attacks