Approach of Data Security in Local Network using Distributed Firewalls

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2011 by IJPTT Journal
Volume-1 Issue-3                           
Year of Publication : 2011
Authors : Hiral B.Patel, Ravi S.Patel, Jayesh A.Patel

MLA

Hiral B.Patel, Ravi S.Patel, Jayesh A.Patel."Approach of Data Security in Local Network using Distributed Firewalls". International Journal of P2P Network Trends and Technology (IJPTT), V1(3):18-21  Nov - Dec 2011, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security policies on a network without restricting its topology on an inside or outside point of view. Use of a policy language and centralized delegating its semantics to all members of the networks domain support application of firewall technology for organizations, which network devices communicate over insecure channels and still allow a logical separation of hosts in- and outside the trusted domain. We introduce the general concepts of such distributed firewalls, its requirements and implications and introduce its suitability to common threats on the Internet, as well as give a short discussion on contemporary implementations.

References

[1] http://en.wikipedia.org
[2] Bellovin, S. M. 1999. Distributed Firewalls.
[3] Gatus, G. E. P., Safavi-Naini, R. and Willy Susilo. 2004. Policy Distribution Using COPSPR in a Distributed Firewall. In Australian Telecommunication Networks and Applications Conference..
[4] Li, Wei. 2000. Distributed Firewall. GeoInformatica. 4(3):253
[5] Oguzhan ÇAKI, March 2008 ,Thesis on “ACCESS MONITORING SYSTEM FOR DISTRIBUTED FIREWALL POLICIES”
[6] Robert Stepanek, Distributed Firewalls In Article In T-110.501 Seminar on Network security 2001
[7] Yunus ERDOĞAN,November 2008,Thesis on “DEVELOPMENT OF A DISTRIBUTED FIREWALL ADMINISTRATION TOOL”

Keywords

Network Security, Security Policy, Pull technique, Push technique, Policy distribution