Skip to main content

Securing Networks Using Situation-Based Firewall Policy Computations

  • Conference paper
Intelligent Computing, Networking, and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 243))

  • 1174 Accesses

Abstract

In the last decade, the number of users connecting with Web has increased by multiple folds. As the number of users is increasing, naturally, the network’s computability load will also increase, which creates the challenges to network in terms of security threats and attacks. At this juncture, the network security plays key-role by using the firewall which is considered as one of most immediate requirements assuring the users about the network security. With expansion of the size of network, it is also required to improve the security road map implementation; otherwise, it would be tough for users to rely on network-based services. In this article, a novel idea has been proposed to cater the avoidance of threats and attack in organization’s network by expanding the scope of firewall policies. The chapter shows the importance of network design and firewall rules compatibility to make network free from threats and attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hu, H., Ahn, G.J., Kulkarni, K.: Detecting and resolving firewall policy anomalies. IEEE Trans. Dependabale Secure Comput. 08(3) (2012)

    Google Scholar 

  2. Wool, A.: A quantitative study of firewall configuration errors. Published by IEEE Society (2004)

    Google Scholar 

  3. Harrington, J.L.: Network security: a practical approach. Elsevier (2011)

    Google Scholar 

  4. Solanki, V.K., Singh, K.P., Venkatesan, M.: Firewalls best practices in the organization. In: CTNGC-2012 held in Institute of Technology and Science, Ghaziabad, UP, Proceedings of CTNGC/Number 3 (ISBN: 973-93-80870-14-1) in Int. J. Comput. Appl. NY, USA and ACM-NCR Chapter, 20th Oct 2012

    Google Scholar 

  5. Solanki, V.K., Singh, K.P., Venkatesan M., Tamilselvan, S.: A holistic approach to secure network using firewalls. FACT’12, vol. 1, pp. 48–56 in National Institute of Technology, Tiruchirrappali, TN, 6th–7th Dec 2012

    Google Scholar 

  6. Solanki, V.K., Singh, K.P., Venkatesan, M., Raghuwanshi, S.: Firewall policies enhancement strategies towards securing networks. In: IEEE Conference technically co-sponsored by IEEE Kerala Section and IEEE India Council, Information Communication Technologies (ICT-13), pp. 07–11. ISBN: 978-1-4673-5757-9, 11th–12th April 2013 Organized by Noorul Islam University, Kanyakumari, Tamilnadu

    Google Scholar 

  7. Pfleegar, C.P., Pfleegar, S.L.: Security in computing, 4th edn. Pearson Prentice Hall (3rd edn) (2007)

    Google Scholar 

  8. Seagren, E., Noonan, W.J.: Secure your network for free. Elsevier Professional and Trade Series Edition (2007)

    Google Scholar 

  9. Stojanovski, N., Gusev, M.: Architecture of a identity based firewalls system. Int. J. Netw. Secur. Appl. 3(4) (2011)

    Google Scholar 

  10. Lieu, A.X.: Change-impact analysis of firewall policies, ESORICS 2007, LNCA 4734, pp. 155–170. Springer, Berlin Heidlberg (2007)

    Google Scholar 

  11. Whitman, M.E., Mattord, H.J.: Principles of information security. Vikas Publishing House, New Delhi (2004)

    Google Scholar 

  12. Horowitz, E., Sahni, S., Rajasekharan, S.: Computer algorithm/C ++, 2nd edn. Universities Press

    Google Scholar 

  13. Solanki, V.K., Venkatesan, M.: An evolution and revolution of network security. ICACT’2012 held in JKK Nattaraja College of Engineering and Technology, Nammakal, TN, 9th–10th March 2012

    Google Scholar 

Download references

Acknowledgments

We are thankful to Prof. A. V. Vijayshankar for providing quality input in this paper. We give our thanks to system administrator and team for cooperating with us during many odd hours. We further extend our sincere thanks to the ICACNI-13 Conference organizer for permitting us to share our research idea before the researchers, academicians, and corporate persons.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijender Kumar Solanki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Solanki, V.K., Singh, K.P., Venkatesan, M., Raghuwanshi, S. (2014). Securing Networks Using Situation-Based Firewall Policy Computations. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_105

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1665-0_105

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1664-3

  • Online ISBN: 978-81-322-1665-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics