ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Data Security in Local Networks Using Distributed Firewalls

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 3)

Publication Date:

Authors : ;

Page : 113-116

Keywords : Network Security; Policy Language; Certificate; Distributed Firewall.;

Source : Downloadexternal Find it from : Google Scholarexternal


Today, computer and networking are inseparable. A number of confidential transactions occur very second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls. Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization. They provide virtually unlimited scalability. In addition, they overcome the single point-of-failure problem presented by the perimeter firewall. Distribute firewall solves these problems and protecting critical network end points where hackers want to penetrate. In this paper I am dealing with distributed firewall concepts, its evolution, its components, and the policies.

Last modified: 2014-03-23 22:13:36