Open Access   Article Go Back

Protection of Network Devices and Data security using Firewall: A literature Survey

Gayatri Deshmukh1 , Rachana Kamble2 , Pratap Singh Solanki3

Section:Survey Paper, Product Type: Journal Paper
Volume-9 , Issue-11 , Page no. 39-44, Nov-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i11.3944

Online published on Nov 30, 2021

Copyright © Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki, “Protection of Network Devices and Data security using Firewall: A literature Survey,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.11, pp.39-44, 2021.

MLA Style Citation: Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki "Protection of Network Devices and Data security using Firewall: A literature Survey." International Journal of Computer Sciences and Engineering 9.11 (2021): 39-44.

APA Style Citation: Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki, (2021). Protection of Network Devices and Data security using Firewall: A literature Survey. International Journal of Computer Sciences and Engineering, 9(11), 39-44.

BibTex Style Citation:
@article{Deshmukh_2021,
author = {Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki},
title = {Protection of Network Devices and Data security using Firewall: A literature Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2021},
volume = {9},
Issue = {11},
month = {11},
year = {2021},
issn = {2347-2693},
pages = {39-44},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5416},
doi = {https://doi.org/10.26438/ijcse/v9i11.3944}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i11.3944}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5416
TI - Protection of Network Devices and Data security using Firewall: A literature Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Gayatri Deshmukh, Rachana Kamble, Pratap Singh Solanki
PY - 2021
DA - 2021/11/30
PB - IJCSE, Indore, INDIA
SP - 39-44
IS - 11
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
258 351 downloads 129 downloads
  
  
           

Abstract

Firewalls play important role in any organization today. Firewall is a layer of security between organization Network and the Internet. A Firewall is programmed with security rules that prevent unregulated access to your internal Network. The rules might control employee access to websites and also prevent files leaving the company over Network. Any number of rules can be used to protect the data. In this literature survey, we studied the work carried out by various researchers about the protection of Network and data security.

Key-Words / Index Term

Firewall, Data Security, Network Protectio, ICT Infrastrcuture, Web Filtering

References

[1] Okumoku-Evroro, Oniovosa, “Application of Firewall system to Internet security”,International journal of information technology and business management,Vol.15 No.1,pp.64,2015.
[2] Okumoku-Evroro, Oniovosa, “Application of Firewall system to Internet security”,International journal of information technology and business management,Vol.15 No.1,pp.64,2015.
[3] Sezer YILDIZ , Umut ALTINI?IK, “ Detecting and preventin cyber attacks on local area Networks: A working example”, International journal of computer science and engineering, Vol.6,Issue11,2018.
[4] Seny Kamara, Sonia Fahmy, Eugene Schultz, Florian Kerschbaum, and Michael Frantzen, “Analysis of Vulnerabilities in Internet Firewalls”Vol.22,No.3,pp.1-19,2003.
[5] Lin, Ding Zhang, Yuqing Fu, Shuxian Wang, “A Design of the Ethernet Firewall Based on FPGA Shunhao”,International Congress on Image and Signal Processing,BioMedical Engineering and Informatics, Shanghai, China,pp.1-5, ISBN: 978-1-5386-1937-7, 2017.
[6] Nastassja Gaudet, Ana E Goulart, Edmond Rogers, Abhijeet Sahu, Kate Davis, “Firewall Configuration and Path Analysis for Smart Grid Networks”. International Workshop Technical Committee on Communications Quality and Reliability, Stevenson, WA, USA, pp.1-6, ISBN:978-1-7281-6627-8, 2020.
[7] Victor Clincy, Hossain Shahriar “Web Application Firewall: Network Security Models and Configuration”,42nd IEEE International Conference on Computer Software & Applications, Tokyo, Japan, pp.1-2, ISBN:978-1-5386-2667-2, 2018.
[8] Nitin Naik and Paul Jen-kins, “Enhancing Windows Firewall Security Using Fuzzy Reasoning” by 14th Intl Conf on Dependable, Autonomic and Secure Computing, Auckland, New Zealand pp.1-7, ISBN:978-1-5090-4065-0, 2016.
[9] Ricardo M. Oliveira Sihyung Lee Hyong S. Kim, “Automatic detection of Firewall misconfigurations using Firewall and Network routing policies”. pp.1-6, 2009.
[10] Qiumei Cheng, Chunming Wu, Haifeng Zhou, Yuhang Zhang, Rui Wang, Wei Ruan, “Guarding the Perimeter of Cloud-based Enterprise Networks: An Intelligent SDN Firewall”. 20th International Conference on High Performance Computing and Communications, Exeter,UK, ISBN:978-1-5386-6614-2, 2018.
[11] Perumalraja Rengaraj, S.Senthil Kumar and Chung-Horng Lung “Investigation of Security and QoS on SDN Firewall Using MAC Filtering”. International Conference on Computer Communication and Informatics, Coimbatore, INDIA, ISBN:978-1-4673-8855-9. 2017
[12] Benfano Soewito “Next Generation Firewall for Improving Security in Company and IOT Network”. International Seminar on Intelligent Technology and Its Applications, pp.1-5 ISBN:978-1-7281-3749-0, 2020.
[13] Robert Winding, Timothy Wright and Micheal Chappel. “ System Anomaly Detection: Mining Firewall Logs”,ISBN:1-4244-0422-3CD:1-4244-0423-1, 2006.
[14] Hitoshi Iyatomi, Michiaki Ito, “Web Application Firewall using Character-level Convolutional Neural Network”.14th International Colloquium on Signal Processing & its Applications, Penang, Malaysia.pp.1-4, 2018.
[15] Manoj Chakravati, “Next Generation Firewall”, International Journal of Computer Science and Information Technologies, Vol.7(3), pp.1-4, 2016.