Protection of Network Devices and Data security using Firewall: A literature Survey
DOI:
https://doi.org/10.26438/ijcse/v9i11.3944Keywords:
Firewall, Data Security, Network Protectio,ICT Infrastrcuture, Web FilteringAbstract
Firewalls play important role in any organization today. Firewall is a layer of security between organization Network and the Internet. A Firewall is programmed with security rules that prevent unregulated access to your internal Network. The rules might control employee access to websites and also prevent files leaving the company over Network. Any number of rules can be used to protect the data. In this literature survey, we studied the work carried out by various researchers about the protection of Network and data security.
References
[1] Okumoku-Evroro, Oniovosa, “Application of Firewall system to Internet security”,International journal of information technology and business management,Vol.15 No.1,pp.64,2015.
[2] Okumoku-Evroro, Oniovosa, “Application of Firewall system to Internet security”,International journal of information technology and business management,Vol.15 No.1,pp.64,2015.
[3] Sezer YILDIZ , Umut ALTINI?IK, “ Detecting and preventin cyber attacks on local area Networks: A working example”, International journal of computer science and engineering, Vol.6,Issue11,2018.
[4] Seny Kamara, Sonia Fahmy, Eugene Schultz, Florian Kerschbaum, and Michael Frantzen, “Analysis of Vulnerabilities in Internet Firewalls”Vol.22,No.3,pp.1-19,2003.
[5] Lin, Ding Zhang, Yuqing Fu, Shuxian Wang, “A Design of the Ethernet Firewall Based on FPGA Shunhao”,International Congress on Image and Signal Processing,BioMedical Engineering and Informatics, Shanghai, China,pp.1-5, ISBN: 978-1-5386-1937-7, 2017.
[6] Nastassja Gaudet, Ana E Goulart, Edmond Rogers, Abhijeet Sahu, Kate Davis, “Firewall Configuration and Path Analysis for Smart Grid Networks”. International Workshop Technical Committee on Communications Quality and Reliability, Stevenson, WA, USA, pp.1-6, ISBN:978-1-7281-6627-8, 2020.
[7] Victor Clincy, Hossain Shahriar “Web Application Firewall: Network Security Models and Configuration”,42nd IEEE International Conference on Computer Software & Applications, Tokyo, Japan, pp.1-2, ISBN:978-1-5386-2667-2, 2018.
[8] Nitin Naik and Paul Jen-kins, “Enhancing Windows Firewall Security Using Fuzzy Reasoning” by 14th Intl Conf on Dependable, Autonomic and Secure Computing, Auckland, New Zealand pp.1-7, ISBN:978-1-5090-4065-0, 2016.
[9] Ricardo M. Oliveira Sihyung Lee Hyong S. Kim, “Automatic detection of Firewall misconfigurations using Firewall and Network routing policies”. pp.1-6, 2009.
[10] Qiumei Cheng, Chunming Wu, Haifeng Zhou, Yuhang Zhang, Rui Wang, Wei Ruan, “Guarding the Perimeter of Cloud-based Enterprise Networks: An Intelligent SDN Firewall”. 20th International Conference on High Performance Computing and Communications, Exeter,UK, ISBN:978-1-5386-6614-2, 2018.
[11] Perumalraja Rengaraj, S.Senthil Kumar and Chung-Horng Lung “Investigation of Security and QoS on SDN Firewall Using MAC Filtering”. International Conference on Computer Communication and Informatics, Coimbatore, INDIA, ISBN:978-1-4673-8855-9. 2017
[12] Benfano Soewito “Next Generation Firewall for Improving Security in Company and IOT Network”. International Seminar on Intelligent Technology and Its Applications, pp.1-5 ISBN:978-1-7281-3749-0, 2020.
[13] Robert Winding, Timothy Wright and Micheal Chappel. “ System Anomaly Detection: Mining Firewall Logs”,ISBN:1-4244-0422-3CD:1-4244-0423-1, 2006.
[14] Hitoshi Iyatomi, Michiaki Ito, “Web Application Firewall using Character-level Convolutional Neural Network”.14th International Colloquium on Signal Processing & its Applications, Penang, Malaysia.pp.1-4, 2018.
[15] Manoj Chakravati, “Next Generation Firewall”, International Journal of Computer Science and Information Technologies, Vol.7(3), pp.1-4, 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
