Protection of Network Devices and Data security using Firewall: A literature Survey

Authors

  • Gayatri Deshmukh B.E Students, Department of Electronics and Telecommunication, Sinhgad College of Engineering, Pune, INDIA
  • Rachana Kamble B.E Students, Department of Electronics and Telecommunication, Sinhgad College of Engineering, Pune, INDIA
  • Pratap Singh Solanki Central Water and Power Research Station, Khadakwasla R.S, Pune, Maharashtra, INDIA

DOI:

https://doi.org/10.26438/ijcse/v9i11.3944

Keywords:

Firewall, Data Security, Network Protectio,ICT Infrastrcuture, Web Filtering

Abstract

Firewalls play important role in any organization today. Firewall is a layer of security between organization Network and the Internet. A Firewall is programmed with security rules that prevent unregulated access to your internal Network. The rules might control employee access to websites and also prevent files leaving the company over Network. Any number of rules can be used to protect the data. In this literature survey, we studied the work carried out by various researchers about the protection of Network and data security.

References

[1] Okumoku-Evroro, Oniovosa, “Application of Firewall system to Internet security”,International journal of information technology and business management,Vol.15 No.1,pp.64,2015.

[2] Okumoku-Evroro, Oniovosa, “Application of Firewall system to Internet security”,International journal of information technology and business management,Vol.15 No.1,pp.64,2015.

[3] Sezer YILDIZ , Umut ALTINI?IK, “ Detecting and preventin cyber attacks on local area Networks: A working example”, International journal of computer science and engineering, Vol.6,Issue11,2018.

[4] Seny Kamara, Sonia Fahmy, Eugene Schultz, Florian Kerschbaum, and Michael Frantzen, “Analysis of Vulnerabilities in Internet Firewalls”Vol.22,No.3,pp.1-19,2003.

[5] Lin, Ding Zhang, Yuqing Fu, Shuxian Wang, “A Design of the Ethernet Firewall Based on FPGA Shunhao”,International Congress on Image and Signal Processing,BioMedical Engineering and Informatics, Shanghai, China,pp.1-5, ISBN: 978-1-5386-1937-7, 2017.

[6] Nastassja Gaudet, Ana E Goulart, Edmond Rogers, Abhijeet Sahu, Kate Davis, “Firewall Configuration and Path Analysis for Smart Grid Networks”. International Workshop Technical Committee on Communications Quality and Reliability, Stevenson, WA, USA, pp.1-6, ISBN:978-1-7281-6627-8, 2020.

[7] Victor Clincy, Hossain Shahriar “Web Application Firewall: Network Security Models and Configuration”,42nd IEEE International Conference on Computer Software & Applications, Tokyo, Japan, pp.1-2, ISBN:978-1-5386-2667-2, 2018.

[8] Nitin Naik and Paul Jen-kins, “Enhancing Windows Firewall Security Using Fuzzy Reasoning” by 14th Intl Conf on Dependable, Autonomic and Secure Computing, Auckland, New Zealand pp.1-7, ISBN:978-1-5090-4065-0, 2016.

[9] Ricardo M. Oliveira Sihyung Lee Hyong S. Kim, “Automatic detection of Firewall misconfigurations using Firewall and Network routing policies”. pp.1-6, 2009.

[10] Qiumei Cheng, Chunming Wu, Haifeng Zhou, Yuhang Zhang, Rui Wang, Wei Ruan, “Guarding the Perimeter of Cloud-based Enterprise Networks: An Intelligent SDN Firewall”. 20th International Conference on High Performance Computing and Communications, Exeter,UK, ISBN:978-1-5386-6614-2, 2018.

[11] Perumalraja Rengaraj, S.Senthil Kumar and Chung-Horng Lung “Investigation of Security and QoS on SDN Firewall Using MAC Filtering”. International Conference on Computer Communication and Informatics, Coimbatore, INDIA, ISBN:978-1-4673-8855-9. 2017

[12] Benfano Soewito “Next Generation Firewall for Improving Security in Company and IOT Network”. International Seminar on Intelligent Technology and Its Applications, pp.1-5 ISBN:978-1-7281-3749-0, 2020.

[13] Robert Winding, Timothy Wright and Micheal Chappel. “ System Anomaly Detection: Mining Firewall Logs”,ISBN:1-4244-0422-3CD:1-4244-0423-1, 2006.

[14] Hitoshi Iyatomi, Michiaki Ito, “Web Application Firewall using Character-level Convolutional Neural Network”.14th International Colloquium on Signal Processing & its Applications, Penang, Malaysia.pp.1-4, 2018.

[15] Manoj Chakravati, “Next Generation Firewall”, International Journal of Computer Science and Information Technologies, Vol.7(3), pp.1-4, 2016.

Downloads

Published

2021-11-30
CITATION
DOI: 10.26438/ijcse/v9i11.3944
Published: 2021-11-30

How to Cite

[1]
G. Deshmukh, R. Kamble, and P. S. Solanki, “Protection of Network Devices and Data security using Firewall: A literature Survey”, Int. J. Comp. Sci. Eng., vol. 9, no. 11, pp. 39–44, Nov. 2021.