International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 05 | May -2017
p-ISSN: 2395-0072
www.irjet.net
DATA SECURITY IN LAN USING DISTRIBUTED FIREWALL Dr.T.Pandikumar1, Mekonnen Gidey2 1Associate
Professor, Department of Computer & IT, Defence University, Ethiopia Department of Computer & IT, Defence University, Ethiopia
2M.Tech,
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -
outside world through wide area networks and the internet.
Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization. They provide virtually unlimited scalability. In addition, they overcome the single point-of-failure problem presented by the perimeter firewall. This paper is a survey paper, dealing with the general concepts such distributed firewalls, its requirements and research introduce, its suitability to common threats on the Internet, as well as give a short discussion on contemporary implementations that a distributed firewall gives complete security to the network.
Traditional firewalls ( Conventional firewalls ) are devices often placed on the edge of the network that act as a bouncer allowing only certain types of traffic in and out of the network which often called perimeter firewalls. They divide the network into two parts; trusted on one side and un-trusted on the other side. For this reason they depend heavily on the topology of the network. Moreover, firewalls are a mechanism for policy control and permit a site administrator to set a policy on external access. Just as file permissions enforces an internal security policy and can enforces an external security policy. 1.2 Statements of the problem Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of services of a computer network and networkaccessible resources. This network security can be achieved by firewalls. Those firewalls may be traditional or distributed firewalls. But Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, end-to-end encryption problems and few more problems lead to the evolution of distributed firewalls. Some of the problems are:
Keywords— Network Security, Pull technique, Push Technique, Policy, Distributed Firewall
1. INTRODUCTION 1.1 Back ground Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. It needed to involves the corrective action taken to ease of use protect from the viruses, prevent hacking of data and to provide authenticated data transfer. Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulations which are frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission and it is a collection of components, which are situated between two networks that filters traffic between them by means of some security policies. A firewall can be an effective means of protecting a local system or network systems from network based security threats while at the same time affording access to the
© 2017, IRJET
|
Impact Factor value: 5.181
Reliance on the topology of the network. Do not protect networks from the internal attacks. Unable to handle some protocols like FTP. Have single entry point and the failure of these results into problems. Causes to network bottlenecks. Unauthorized entry points can bypass the network security
The Solution to this growing problem will never be found by simply improving the security technology of traditional firewall products. 1.3 Objectives of the Research Papers The objective of this paper is to brief the solution to the problems of conventional firewalls. What’s needed is an entirely new model of perimeter security that recognizes the strengths of the firewall as an
|
ISO 9001:2008 Certified Journal
|
Page 867