Local Network Security Using Distributed Firewall
[1]
Umar Danjuma Maiwada, Faculty of Natural and Applied Science, Mathematics & Computer-Science Department, Ummar Musa Yar’adua University, Katsina, Nigeria.
Our Networks and computers at home, schools, offices, companies and other places are not secured because a number of confidential transaction occur every second and today computers are used mostly for transaction rather than processing of data, so Data security is needed to prevent hacking of data and to provide authenticated data transfer. Data security can be achieved by Firewall; a firewall is typically placed at the edge of a system and acts as a filter for unauthorized traffic. But conventional firewalls rely on the notions of restricted topology and controlled entry points to function. In most systems today, the firewall is the machine that implements the “security policy” for a system. Firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is assumed not to be secure and trusted. Distributed firewall is a mechanism to enforce a network domain security policy through the use of policy language Security policy is defined centrally. Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization. This paper will introduce the concept of distributed firewall as a security policy of local networks. I will study Distributed firewall because it gives total security to a network.
Local Networks, Security Policy, Firewall, Distributed Firewall
[1]
A Thesis Proposal Presented to The Academic Faculty by Lane Thames Georgia Institute of Technology April 2008.
[2]
AtulKahate, “Cryptography and Network Security”, ISBN-13: 978-0-07-064823-4, ISBN-10:0- 07-064823-9, McGraw Hill Higher Education.
[3]
Avi Fogel, Pushing Security to Network Endpoints, http://www.nwfusion.com/archive/2000/99612_06-26-2000.html,
[4]
Behrouz A. Forouzan, Debdeep Mukhopadhyay, “Cryptography and Network Security McGraw Hill Higher Education.
[5]
Dr. Mostafa Hassan Dahshan “Security and Internet Protocol”, Computer Engineering 44
[6]
Gary A. Donahue (June 2007) network warrior O’Reilly p5
[7]
Gatus, G. E. P., Safavi-Naini, R. and Willy Susilo. 2004. Policy Distribution Using COPSPR in a Distributed Firewall. In Australian Telecommunication Networks and Applications Conference.
[8]
HiralB. Patel, Ravi S. Patel, JayeshA. Patel, “Approach of Data Security in Local Network using Distributed Firewalls”, International Journal of P2P Network Trends and Technology- Volume1Issue3-2011.
[9]
Robert Graham, Network Intrusion Detection, http://www.robertgraham.com/pubs/network-intrusion-detection.html
[10]
Scott Granneman (2002), Security focus, http://online.securityfocus.com/infocus/1527
[11]
Patel, Ravi S. Patel, Jayesh A. Patel; Thread, data, security in Local Network using distributed firewall, http://www.seminarprojects.com/Thread-data-security-in-localnetwork-using-distributed-firewalls.
[12]
http://en.wikipedia.org
[13]
Ioannidis, S. and Keromytis, A. D., and Bellovin, S. M. and J. M. Smith, "Implementing a Distributed Firewall", Proceedings of Computer and Communications Security (CCS), pp. 190-199, November 2000, Athens, Greece.
[14]
Justin Weisz jweisz@andrew.cmu.edu Network Security 15-441 Networks Fall 2002.
[15]
Kyle Wheeler, “Distributed Firewall Policy Validation”, December 7, 2004.
[16]
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The keynote trust management system version 2. Internet RFC 2704, September 1999.
[17]
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proc. of the 17th Symposium on Security and Privacy, pages 164–173. IEEE Computer Society Press, Los Alamitos, 1996.
[18]
Oguzhan ÇAKI, March 2008, Thesis on “Access monitoring system for distributed firewall policies”
[19]
Robert Stepanek, “Distributed Firewalls”, rost@cc.hut.fi, T-110.501 Seminar on Network Security, HUT TML 2001.
[20]
Smith, R., Chen, Y., and Bhattacharya, S., \Cascade of distributed and cooperating firewalls in a secure data network," in IEEE Transactions on Knowledge and Data Engineering, vol. 15, pp. 1307{1315, 2003.
[21]
Sotiris Ioannidis, Angelos D. Keromytis, Steve M. Bellovin, and Jonathan M. Smith, Implementing a Distributed Firewall http://www.cis.upenn.edu/~angelos/Papers/df.pdf
[22]
Taylor, David. "Are there Vulnerabilities in VLAN Implementations?" Intrusion Detection FAQ. 12 Jul 2000. URL: http://www.sans.org/newlook/resources/IDFAQ/vlan.htm (15 Dec. 2002).
[23]
Thames, L., Abler, R., and Saad, A., \Hybrid intelligent systems for network security," in Proceedings of the 2006 ACM Southeast Conference (ACMSE06), (Melbourne, Florida), 2006.
[24]
William Stalling, “Cryptography and Network Security Principles and Practices”, ISBN-978-81- 775-8774-6, PEARSON.
[25]
W. R. Cheswick and S. M. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, 1994.
[26]
Yunus ERDOĞAN,November 2008,Thesis on “DEVELOPMENT OF A DISTRIBUTED FIREWALL ADMINISTRATION TOOL”.
[27]
Zou, C., Towsley, D., and Weibo, G., \A firrewall network system for worm defense in enterprise networks," in Technical Report: TR-04-CSE-01, University of Massachusetts, (Amherst, Massachusetts), 2004.
[28]
(Trudel, B., Convery, S. "SAFE: A Security Blueprint for Enterprise Networks."2000.)