An Effective Policy Anomaly Management Framework for Firewalls
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5
Abstract
Firewalls are devices or programs that control the flow of network traffic between hosts or networks that employ differing security postures. While firewalls are often discussed in the context of Internet connectivity, they may also have applicability in various other network environments. At one time, most firewalls were deployed at the network perimeters. This rovided some measure of protection for internal hosts, but it could not recognize all instances and forms of attacks, and attacks sent from one internal host to another often do not pass through network firewalls. Because of these and other factors network designers now often include firewall functionality at places other than the network perimeter to provide an additional layer of network security. Due to the increasing threat of network attacks, firewalls have become important integrated elements not only in the enterprise networks but also in small-size and home networks. Firewalls have been the frontier defense for secure networks against attacks and unauthorized traffic by filtering out unnecessary network traffic coming into or going from the secured network. In this paper, we represent an effective policy anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions.
Authors and Affiliations
Akula Kumar, Syed Gouse
Optimizing Bunsen burner Performance Using CFD Analysis
Industry relies on heat from the burners in all combustion systems. Optimizing burner performance is critical to complying with stringent emissions requirements and to improve industrial productivity. Even small im...
An Improved Single Phase Transformer less Inverter Topology for Cost Effective PV Systems
In grid connected PV systems, the elimination of isolation transformer introduces common mode leakage current due to the parasitic capacitance between PV panels and the ground. The common mode leakage current red...
Reheating Refrigeration System
The title “Reheating Refrigeration System” has the objective to utilize the rejected heat from the condenser of an air conditioner in an economy way. This will be done by adding an arrangement called “REHEATER...
Vibration Analysis of Composite Plate
Absrtact: Most of the structural components are generally subjected to dynamic loadings in their Working life. Very often these components may have to perform in severe dynamic environment where in the maximum dama...
Simulation of Direct Torque Control of Induction motor using Space Vector Modulation Methodology
This paper presents simulation of Direct Torque Control (DTC) of Induction Motor using Space Vector Modulation (SVM). Direct Torque Control is a control strategy used for high performance torque control of Induc...