Protection of Network Devices and Data security using Firewall: A literature Survey
Gayatri Deshmukh1 , Rachana Kamble2 , Pratap Singh Solanki3
Section:Survey Paper, Product Type: Journal Paper
Volume-9 ,
Issue-11 , Page no. 39-44, Nov-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i11.3944
Online published on Nov 30, 2021
Copyright © Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki, “Protection of Network Devices and Data security using Firewall: A literature Survey,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.11, pp.39-44, 2021.
MLA Style Citation: Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki "Protection of Network Devices and Data security using Firewall: A literature Survey." International Journal of Computer Sciences and Engineering 9.11 (2021): 39-44.
APA Style Citation: Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki, (2021). Protection of Network Devices and Data security using Firewall: A literature Survey. International Journal of Computer Sciences and Engineering, 9(11), 39-44.
BibTex Style Citation:
@article{Deshmukh_2021,
author = {Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki},
title = {Protection of Network Devices and Data security using Firewall: A literature Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2021},
volume = {9},
Issue = {11},
month = {11},
year = {2021},
issn = {2347-2693},
pages = {39-44},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5416},
doi = {https://doi.org/10.26438/ijcse/v9i11.3944}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i11.3944}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5416
TI - Protection of Network Devices and Data security using Firewall: A literature Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki
PY - 2021
DA - 2021/11/30
PB - IJCSE, Indore, INDIA
SP - 39-44
IS - 11
VL - 9
SN - 2347-2693
ER -
VIEWS | XML | |
398 | 451 downloads | 177 downloads |
Abstract
Firewalls play important role in any organization today. Firewall is a layer of security between organization Network and the Internet. A Firewall is programmed with security rules that prevent unregulated access to your internal Network. The rules might control employee access to websites and also prevent files leaving the company over Network. Any number of rules can be used to protect the data. In this literature survey, we studied the work carried out by various researchers about the protection of Network and data security.
Key-Words / Index Term
Firewall, Data Security, Network Protectio, ICT Infrastrcuture, Web Filtering
References
[1] Okumoku-Evroro, Oniovosa, “Application of Firewall system to Internet security”,International journal of information technology and business management,Vol.15 No.1,pp.64,2015.
[2] Okumoku-Evroro, Oniovosa, “Application of Firewall system to Internet security”,International journal of information technology and business management,Vol.15 No.1,pp.64,2015.
[3] Sezer YILDIZ , Umut ALTINI?IK, “ Detecting and preventin cyber attacks on local area Networks: A working example”, International journal of computer science and engineering, Vol.6,Issue11,2018.
[4] Seny Kamara, Sonia Fahmy, Eugene Schultz, Florian Kerschbaum, and Michael Frantzen, “Analysis of Vulnerabilities in Internet Firewalls”Vol.22,No.3,pp.1-19,2003.
[5] Lin, Ding Zhang, Yuqing Fu, Shuxian Wang, “A Design of the Ethernet Firewall Based on FPGA Shunhao”,International Congress on Image and Signal Processing,BioMedical Engineering and Informatics, Shanghai, China,pp.1-5, ISBN: 978-1-5386-1937-7, 2017.
[6] Nastassja Gaudet, Ana E Goulart, Edmond Rogers, Abhijeet Sahu, Kate Davis, “Firewall Configuration and Path Analysis for Smart Grid Networks”. International Workshop Technical Committee on Communications Quality and Reliability, Stevenson, WA, USA, pp.1-6, ISBN:978-1-7281-6627-8, 2020.
[7] Victor Clincy, Hossain Shahriar “Web Application Firewall: Network Security Models and Configuration”,42nd IEEE International Conference on Computer Software & Applications, Tokyo, Japan, pp.1-2, ISBN:978-1-5386-2667-2, 2018.
[8] Nitin Naik and Paul Jen-kins, “Enhancing Windows Firewall Security Using Fuzzy Reasoning” by 14th Intl Conf on Dependable, Autonomic and Secure Computing, Auckland, New Zealand pp.1-7, ISBN:978-1-5090-4065-0, 2016.
[9] Ricardo M. Oliveira Sihyung Lee Hyong S. Kim, “Automatic detection of Firewall misconfigurations using Firewall and Network routing policies”. pp.1-6, 2009.
[10] Qiumei Cheng, Chunming Wu, Haifeng Zhou, Yuhang Zhang, Rui Wang, Wei Ruan, “Guarding the Perimeter of Cloud-based Enterprise Networks: An Intelligent SDN Firewall”. 20th International Conference on High Performance Computing and Communications, Exeter,UK, ISBN:978-1-5386-6614-2, 2018.
[11] Perumalraja Rengaraj, S.Senthil Kumar and Chung-Horng Lung “Investigation of Security and QoS on SDN Firewall Using MAC Filtering”. International Conference on Computer Communication and Informatics, Coimbatore, INDIA, ISBN:978-1-4673-8855-9. 2017
[12] Benfano Soewito “Next Generation Firewall for Improving Security in Company and IOT Network”. International Seminar on Intelligent Technology and Its Applications, pp.1-5 ISBN:978-1-7281-3749-0, 2020.
[13] Robert Winding, Timothy Wright and Micheal Chappel. “ System Anomaly Detection: Mining Firewall Logs”,ISBN:1-4244-0422-3CD:1-4244-0423-1, 2006.
[14] Hitoshi Iyatomi, Michiaki Ito, “Web Application Firewall using Character-level Convolutional Neural Network”.14th International Colloquium on Signal Processing & its Applications, Penang, Malaysia.pp.1-4, 2018.
[15] Manoj Chakravati, “Next Generation Firewall”, International Journal of Computer Science and Information Technologies, Vol.7(3), pp.1-4, 2016.