CFP last date
20 January 2025
Reseach Article

Distributed Firewalls Mechanism for the Resolution of Packets Forwarding Problems in Computer Networks using RSA-CRT Technique

by Bukola Fatimah Balogun
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 15
Year of Publication: 2021
Authors: Bukola Fatimah Balogun
10.5120/ijca2021921046

Bukola Fatimah Balogun . Distributed Firewalls Mechanism for the Resolution of Packets Forwarding Problems in Computer Networks using RSA-CRT Technique. International Journal of Computer Applications. 174, 15 ( Jan 2021), 32-38. DOI=10.5120/ijca2021921046

@article{ 10.5120/ijca2021921046,
author = { Bukola Fatimah Balogun },
title = { Distributed Firewalls Mechanism for the Resolution of Packets Forwarding Problems in Computer Networks using RSA-CRT Technique },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2021 },
volume = { 174 },
number = { 15 },
month = { Jan },
year = { 2021 },
issn = { 0975-8887 },
pages = { 32-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number15/31756-2021921046/ },
doi = { 10.5120/ijca2021921046 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:14.066132+05:30
%A Bukola Fatimah Balogun
%T Distributed Firewalls Mechanism for the Resolution of Packets Forwarding Problems in Computer Networks using RSA-CRT Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 15
%P 32-38
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A firewall is a security barrier that is installed between a private network and the public networks (or Internet) at the point of entry to filter all incoming and outgoing packets across it. Firewalls have the responsibility of reviewing any incoming or outgoing packets and reach the decisions about accepting or discarding them. On the basis of contradictory laws, firewalls make decision for each packet in resolving conflicts as the first rule matching the packet. The conventional procedure for constructing firewalls involves a series of rules though inefficient due to the problem of continuity (difficulty in correctly ordering the rules); the completeness problem (difficulty in ensuring thorough scrutiny of all traffic types); and the compactness problem (difficult to keep the number of rules small) because some rules may be redundant and some rules may be combined into one rule. Again, traditional firewalls rely on the concepts of restricted network topology for its operations, and regulation of points of network entry. In particular, firewalls depend on the presumption that node on one side of the entry point of the firewall is to be trusted, and that node on the other side is an enemy. However, this presumption is possible theoretically because of recent advances and access to the Internet. This paper proposes a resolution of packets forwarding problems on computer networks based on distributed firewalls mechanism. The Iptables serve as a policy language, and system management tools. The outcomes showed considerable specification and distribution of resolution policy on Linux operating systems.

References
  1. Cwalinski, R. (2019). An SDN-based Approach to Protect Communication Between Virtual Machines. 262–265.
  2. Da Costa Júnior, E., da Silva, C., Pinheiro, M. et al. (2018). A new approach to deploy a self-adaptive distributed firewall. J Internet Serv Appl., 9(12), https://doi.org/10.1186/s13174-018-0083-6
  3. Fraser, B. (2016). Networking Group. RFC 2196. Site security handbook, https://www.ietf.org/rfc/rfc2196.txt.
  4. Hu, H., Han, W., Kyung, S., Wang, J., Ahn, G., Zhao, Z., & Li, H. (2019). Computers & Security Towards a reliable firewall for software-defined networks. Computers & Security, 87, 101597. https://doi.org/10.1016/j.cose.2019.101597
  5. Jmal, R., & Fourati, L. C. (2020). Distributed software defined information centric networking. Int. J. High Performance Computing and Networking, 16(1), 14–25.
  6. Lai, Y., Jiang, G., Li, J., & Yang, Z. (2009, February). Design and implementation of distributed firewall system for IPv6. In 2009 International Conference on Communication Software and Networks, pp. 428-432. IEEE.
  7. Nife, F. N., & Kotulski, Z. (2020). Application ‑ Aware Firewall Mechanism for Software. Journal of Network and Systems Management, 28(3), 605–626. https://doi.org/10.1007/s10922-020-09518-z
  8. Pandikumar, T., & Gidey, M. (2017). Data Security in LAN Using Distributed Firewall. Int. Research Journal of Engineering and Technology, 04(05), 867-873.
  9. Prabakaran, S. (2019). Stateful firewall ‐ enabled software ‐ defined network with distributed controllers : A network performance study. (October), 1–17. https://doi.org/10.1002/dac.4237
  10. Sahay, R., Meng, W., & Jensen, C. D. (2019). The application of Software Defined Networking on securing computer networks : A survey. Journal of Network and Computer Applications, 131, 89–108. https://doi.org/10.1016/j.jnca.2019.01.019
  11. Ioannidis, S., Keromytis, A. D., Bellovin, S. M., & Smith, J. M. (2003). Implementing a Distributed Firewall http://www.cis.upenn.edu/~angelos/Papers/df.pdf
  12. Vacca, J. R. (2007). Practical Internet security. USA: Springer.
  13. Valenza, F., & Cheminod, M. (2020). An Optimized Firewall Anomaly Resolution. Journal of Internet Services and Information Security, 10(1), 22–37. https://doi.org/10.22667/JISIS.2020.02.29.022
  14. Youssef, N. B., Bouhoula, A., & Jacquemard, F. (2009). Automatic Verification of Conformance of Firewall Configurations to Security Policies. In IEEE Symposium on Computers and Communications, 526–531, IEEE Computer Society Press.
  15. da Costa Junior, E., da Silva, C., Pinheiro, M. et al. A new approach to deploy a self-adaptive distributed firewall. J Internet Serv Appl 9, 12 (2018). https://doi.org/10.1186/s13174-018-0083-6.
  16. Shieh, Choung-Yaw. (2013). Distributed firewall architecture using virtual machines.
Index Terms

Computer Science
Information Sciences

Keywords

Network Firewall Iptables Security Policy RSA CRT