Welcome to Open Science
Contact Us
Home Books Journals Submission Open Science Join Us News
Local Network Security Using Distributed Firewall
Current Issue
Volume 4, 2017
Issue 2 (March)
Pages: 8-22   |   Vol. 4, No. 2, March 2017   |   Follow on         
Paper in PDF Downloads: 53   Since Jul. 10, 2017 Views: 1303   Since Jul. 10, 2017
Umar Danjuma Maiwada, Faculty of Natural and Applied Science, Mathematics & Computer-Science Department, Ummar Musa Yar’adua University, Katsina, Nigeria.
Our Networks and computers at home, schools, offices, companies and other places are not secured because a number of confidential transaction occur every second and today computers are used mostly for transaction rather than processing of data, so Data security is needed to prevent hacking of data and to provide authenticated data transfer. Data security can be achieved by Firewall; a firewall is typically placed at the edge of a system and acts as a filter for unauthorized traffic. But conventional firewalls rely on the notions of restricted topology and controlled entry points to function. In most systems today, the firewall is the machine that implements the “security policy” for a system. Firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is assumed not to be secure and trusted. Distributed firewall is a mechanism to enforce a network domain security policy through the use of policy language Security policy is defined centrally. Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization. This paper will introduce the concept of distributed firewall as a security policy of local networks. I will study Distributed firewall because it gives total security to a network.
Local Networks, Security Policy, Firewall, Distributed Firewall
A Thesis Proposal Presented to The Academic Faculty by Lane Thames Georgia Institute of Technology April 2008.
AtulKahate, “Cryptography and Network Security”, ISBN-13: 978-0-07-064823-4, ISBN-10:0- 07-064823-9, McGraw Hill Higher Education.
Avi Fogel, Pushing Security to Network Endpoints, http://www.nwfusion.com/archive/2000/99612_06-26-2000.html,
Behrouz A. Forouzan, Debdeep Mukhopadhyay, “Cryptography and Network Security McGraw Hill Higher Education.
Dr. Mostafa Hassan Dahshan “Security and Internet Protocol”, Computer Engineering 44
Gary A. Donahue (June 2007) network warrior O’Reilly p5
Gatus, G. E. P., Safavi-Naini, R. and Willy Susilo. 2004. Policy Distribution Using COPSPR in a Distributed Firewall. In Australian Telecommunication Networks and Applications Conference.
HiralB. Patel, Ravi S. Patel, JayeshA. Patel, “Approach of Data Security in Local Network using Distributed Firewalls”, International Journal of P2P Network Trends and Technology- Volume1Issue3-2011.
Robert Graham, Network Intrusion Detection, http://www.robertgraham.com/pubs/network-intrusion-detection.html
Scott Granneman (2002), Security focus, http://online.securityfocus.com/infocus/1527
Patel, Ravi S. Patel, Jayesh A. Patel; Thread, data, security in Local Network using distributed firewall, http://www.seminarprojects.com/Thread-data-security-in-localnetwork-using-distributed-firewalls.
Ioannidis, S. and Keromytis, A. D., and Bellovin, S. M. and J. M. Smith, "Implementing a Distributed Firewall", Proceedings of Computer and Communications Security (CCS), pp. 190-199, November 2000, Athens, Greece.
Justin Weisz jweisz@andrew.cmu.edu Network Security 15-441 Networks Fall 2002.
Kyle Wheeler, “Distributed Firewall Policy Validation”, December 7, 2004.
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The keynote trust management system version 2. Internet RFC 2704, September 1999.
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proc. of the 17th Symposium on Security and Privacy, pages 164–173. IEEE Computer Society Press, Los Alamitos, 1996.
Oguzhan ÇAKI, March 2008, Thesis on “Access monitoring system for distributed firewall policies”
Robert Stepanek, “Distributed Firewalls”, rost@cc.hut.fi, T-110.501 Seminar on Network Security, HUT TML 2001.
Smith, R., Chen, Y., and Bhattacharya, S., \Cascade of distributed and cooperating firewalls in a secure data network," in IEEE Transactions on Knowledge and Data Engineering, vol. 15, pp. 1307{1315, 2003.
Sotiris Ioannidis, Angelos D. Keromytis, Steve M. Bellovin, and Jonathan M. Smith, Implementing a Distributed Firewall http://www.cis.upenn.edu/~angelos/Papers/df.pdf
Taylor, David. "Are there Vulnerabilities in VLAN Implementations?" Intrusion Detection FAQ. 12 Jul 2000. URL: http://www.sans.org/newlook/resources/IDFAQ/vlan.htm (15 Dec. 2002).
Thames, L., Abler, R., and Saad, A., \Hybrid intelligent systems for network security," in Proceedings of the 2006 ACM Southeast Conference (ACMSE06), (Melbourne, Florida), 2006.
William Stalling, “Cryptography and Network Security Principles and Practices”, ISBN-978-81- 775-8774-6, PEARSON.
W. R. Cheswick and S. M. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, 1994.
Zou, C., Towsley, D., and Weibo, G., \A firrewall network system for worm defense in enterprise networks," in Technical Report: TR-04-CSE-01, University of Massachusetts, (Amherst, Massachusetts), 2004.
(Trudel, B., Convery, S. "SAFE: A Security Blueprint for Enterprise Networks."2000.)
Open Science Scholarly Journals
Open Science is a peer-reviewed platform, the journals of which cover a wide range of academic disciplines and serve the world's research and scholarly communities. Upon acceptance, Open Science Journals will be immediately and permanently free for everyone to read and download.
Office Address:
228 Park Ave., S#45956, New York, NY 10003
Phone: +(001)(347)535 0661
Copyright © 2013-, Open Science Publishers - All Rights Reserved