CFP last date
20 May 2024
Reseach Article

Data Security in Local Network using Distributed Firewall : A Review

Published on December 2014 by Suraj J. Warade, Pritish A. Tijare, Swapnil. N. Sawalkar
National Conference on Emerging Trends in Computer Technology
Foundation of Computer Science USA
NCETCT - Number 2
December 2014
Authors: Suraj J. Warade, Pritish A. Tijare, Swapnil. N. Sawalkar
756cf4d2-b9d7-4ada-b29a-b8cdeeccbcba

Suraj J. Warade, Pritish A. Tijare, Swapnil. N. Sawalkar . Data Security in Local Network using Distributed Firewall : A Review. National Conference on Emerging Trends in Computer Technology. NCETCT, 2 (December 2014), 19-21.

@article{
author = { Suraj J. Warade, Pritish A. Tijare, Swapnil. N. Sawalkar },
title = { Data Security in Local Network using Distributed Firewall : A Review },
journal = { National Conference on Emerging Trends in Computer Technology },
issue_date = { December 2014 },
volume = { NCETCT },
number = { 2 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 19-21 },
numpages = 3,
url = { /proceedings/ncetct/number2/19089-4024/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Computer Technology
%A Suraj J. Warade
%A Pritish A. Tijare
%A Swapnil. N. Sawalkar
%T Data Security in Local Network using Distributed Firewall : A Review
%J National Conference on Emerging Trends in Computer Technology
%@ 0975-8887
%V NCETCT
%N 2
%P 19-21
%D 2014
%I International Journal of Computer Applications
Abstract

With the vast internet connections, the network security gained the attention of researcher and developers. Network Security is important for providing the authenticated data transfer. Network security can be achieve by the firewall. The Conventional firewall acts like a filter which restricts the unauthorized traffic. Firewall is situated at the entry point of a network. In Conventional firewall everyone on the protected side is trusted. To remove the shortcomings of traditional firewalls, the concept of a "distributed firewall" has been proposed. In which security policy is still centrally defined, but implementation is at individual endpoints.

References
  1. Ioannidis, S. and Keromytis, A. D. , and Bellovin, S. M. and J. M. Smith, "Implementing a Distributed Firewall", Proceedings of Computer and Communications Security (CCS), pp. 190-199, November 2000, Athens, Greece.
  2. Behrouz A. Forouzan, Debdeep Mukhopadhyay, "Cryptography and Network Security", ISBN-13: 978-0- 07-070208-0, ISBN-10: 0-07-070208-X, McGrawHill Higher Education.
  3. Rajendra H. Rathod, V. M. Deshmukh " Roll of Distributed firewall in local network for Data Security" International Journal Of Computer Science And Applications Vol. 6, No. 2, April 2013
  4. Hiral B. Patel, Ravi S. Patel, Jayesh A. Patel, "Approach of Data Security in Local Network using Distributed Firewalls", International Journal of P2P Network Trends and Technology-Volume1Issue3-2011.
  5. http://en. wikipedia. org/wiki/Distributed_firewall.
  6. Robert Stepanek, "Distributed Firewalls", rost@cc. hut. fi, T-110. 501 Seminar on Network Security, HUT TML 2001.
  7. Steven M. Bellovin, "Distributed Firewalls", November 1999 issue of; login: pp. 37-39.
  8. Ehab Al-Shaer, Hazem Hamed, Raouf Boutaba, and Masum Hasan "Conflict Classification and Analysis of Distributed Firewall Policies. " IEEE Journal in selected areas in communication VOL. 23, NO. 10, October 2005.
  9. Yunus ERDOGAN "Development of a Distributed Firewall Administration tool" November 2008.
  10. Bellovin, S. M. and W. R. Cheswick,"Firewalls and Internet Security: Repelling the Wily Hacker", Addison-Wesley, 1994.
  11. http://ids. nic. in/technical_letter/TNL_JCES_JU0 L_2013/Data%20Security%20in%20Local%20 Network%20Using%20Distributed%20Firewall. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Distributed Firewall.