Security Issues of Firewall

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2016 by IJPTT Journal
Volume - 6 Issue - 1
Year of Publication : 2016
Authors : Aakanksha Chopra
DOI :  10.14445/22492615/IJPTT-V22P402

Citation

Aakanksha Chopra "Security Issues of Firewall". International Journal of P2P Network Trends and Technology (IJPTT), V6(1):4-9 Jan - Feb 2016, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.

Abstract

The need of Network Security is accelerating at the same pace as that of increased Internet usage. Network Security prevents from illegitimate admittance, hacking andauthentic data transportation. Network Security consist of provisions and policies adopted by a network administrator to preclude and monitor unauthorized access, alterations, perversion, declination of a computer network and network-accessible resources. Network Security is achieved by Firewall. Firewall is a hardware or software device which is designed to permit or refuse network transmissions based upon certain protocols. Firewall is a locus at the endpoints of the system which strains out all illegitimate traffic and users. But conventional or traditional firewalls rely strictly on the restricted topology and restrained entry points to function; which results in difficulty in filtering certain protocols, end-to-end encryption problem etc. Hence, it resulted inthe evolution of Distributed Firewall which strengthens the network security policies without delimitating its topology from inside or outside. Distributed Firewall is a host-resident security software application that protectsthe enterprise network’s servers and end-user machines against unwanted intrusion. Thispaper is a literature review paper focussing on traditional firewalls, it evolution, security issues various policies and theconcept of distributed firewall.

References

[1] Kahate, A. Cryptography and Network Security. ISBN-13: 978- 0-07-064823-4, ISBN-10:0-07-64823-9, McGraw Hill Higher Education.
[2] Forouzan, B. A., & Mukhopadhyay, D. Cryptography and Network Security. ISBN-13:978-0- 07-70208-0, ISBN-10: 0-07- 070208-X, Mc Graw Hill Higher Education.
[3] Stallings, W. Cryptography and Network Security Principles and Practices. ISBN-978-81-775-8774-6.
[4] Tanenbaum, A. S., Watherall, D. J. Computer Networks. ISBN- 13: 978-0132126953, ISBN-10: 0132126958, 5th Edition, Paperback, 2010, pp: 34-39.
[5] Rathod, R.H., & Deshmukh, Prof. V.M. (2013). Role of Distributed Firewalls in Local Network for Data Security. International Journal of Computer Science and Applications, Vol. 6, No. 2, Apr 2013, ISSN: 0974-011 (open access), pp: 360- 364.Retrieved from official website: www.researchpublications.org
[6] Zeng-gang, X., & Xue-min, Z. (2010). Research and Design on distributed Firewall based on LAN. Computer and Automation Engineering (ICCAE), 2010, E-ISBN: 978-1-4244-5586-7, Print ISBN: 978-1-4244-5585-0, INSPEC Accession Number: 11259785, DOI: 10.1109/ICCAE.2010.5451596, Publisher: IEEE, Singapore, pp: 517-520
[7] Patel, H. B., Patel, R. S., & Patel, J. A. (2011). Approach of Data Security in Local Network using Distributed Firewalls. International Journal of P2P Network Trends and Technology (IJPTT), Vol. 1 Issue 3- 2011, ISSN: 2249-2615, pp: 26-29.
Retrieved from: http://www.internationaljournalssrg.org [8] Avolio, F. Firewalls and Internet Security, the Second Hundred (Internet) Years. The Internet Protocol Journal, Vol. 2, No. 2.Retrieved from official website of CISCO: http://www.cisco.com/web/about/ac123/ac147/ac174/ac200/about_ cisco_ipj_archive_article09186a00800c85ae.html
[9] Sahare, S., Joshi, M., & Gehlot, M. (2012). A Survey Paper: Data Security in Local Networks Using Distributed Firewalls. International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 9 Sep 2012, ISSN: 0975-3397, pp: 1617-1622.
[10] Gaud, J.V., & Bartere, M.M. (2014). Data Security Based on LAN Using Distributed Firewall. International Journal of Computer Science and Mobile Computing (IJCSMC), Vol. 3, Issue. 3, March 2014, ISSN pp: 386-391.Retrieved from IJCSMC official website:www.ijcsmc.com
[11] Bhovare, S. R., & Chaudhari, B. K. (2014). A Survey on Data Security Provided in Local Network Using Distributed Firewall. International Journal of Research in Advent Technology, Vol. 2, No. 4, April 2014, E-ISSN: 2321-9637, pp: 169-171.
[12] Warade, S. J., Tijare, P. A., & Sawalkar, S. N. (2014). Data Security in Local Network using Distributed Firewall: A Review. International Journal of Computer Applications (0975-8887), National Conference on Emerging Trends in Computer Technology (NCETCT-2014), pp: 19-21.
[13] (2009) Wikipedia. [Online]. Available:https://en.wikipedia.org/wiki/Distributed_firewall.
[14] S. Tom. Networking defined & Hyperlinked. [Online]. Available:www.linktionary.com/c/circ_firewall.html
[15]Marcus J. Ranum (1997). [Online]. Available:www.ranum.com/security/computer_security/archives/ internet-attacks.pdf
[16] Security Attacks. [Online]. Available: http://www.comptechdoc.org/independent/security/recommendatio ns/secattacks.html.

Keywords
Firewall, Network Security Issues, Firewall Policies, Distributed Firewall.