Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Data Security in Local Network using Distributed Firewalls
#1

[attachment=5364]
This article is presented by:
ADEWOLE ADEBIYI CLEMENT
DATA SECURITY IN A NETWORK TRANSMISSION

ABSTRACT
This paper gives a topical overview of data security in network transmission. Internet network data security has assumed great importance since the quantum of mission critical data that is being compromised has assumed great proportions. In fact, internet network data security is now a leading cause of national security concerns worldwide.
Even in corporate , internet network data security topics in the form of intrusions into corporate mission critical data often invades the corporate boardrooms, where black coated directors (who have hardly used a computer in their life) debate on internet networking security strategies.

INTRODUCTION
The requirements of data security have undergone three major changes in the last decades. The first major change was the introduction of the computer. The need for protecting files and information became evident. Collection of tools designed to protect data and to avoid hacker attacks has the generic name computer security. The second major change was the introduction of distributed systems, networks and communication facilities for data communication. Network security measures are needed to protect data during transmission. The third change is the current, rapid development of wireless networks and mobile communications. Wireless security is therefore of high priority today.

DEFINITIONS OF TERMS
Address mapping: By translating network addresses from one format to another, this methodology permits different protocols to operate interchangeably.

Address mask: A bit combination descriptor identifying which portion of an address refers to the network or subnet and which part refers to the host sometimes simply called the mask.

Area: A logical, rather than physical, set of segments along with their attached devices. Areas are commonly connected to others using routers to create a single autonomous system.

ATM (Asynchronous Transfer Mode): The international standard, identified by fixed-length 53-byte cells, for transmitting cells in multiple service systems, such as voice, video, or data. Transit delays are reduced because the fixed-length cells permit processing to occur in the hardware. ATM is designed to maximize the benefits of high-speed transmission media, such as SONET, E3, and T3.

Bandwidth: The gap between the highest and lowest frequencies employed by network signals. More commonly, it refers to the rated throughput capacity of a network protocol or medium.
Shy
Reply

#2
Definition
Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls.

A distributed firewall is a mechanism to enforce a network domain security policy through the use of a policy language, a policy distribution scheme enabling policy control from a central point and certificates, enabling the identification of any member of the network policy domain.

Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization.They provide virtually unlimited scalability. In addition, they overcome the singlepoint-of-failure problem presented by the perimeter firewall.

Introduction
Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. This is important because the most costly and destructive attacks still originate from within the organization.
Evolution of Distributed Firewall from the Conventional Firewall :

A firewall is a collection of components, interposed between two networks, that filters traffic between them according to some security policy.

Basic structure of a firewall
Some problems with the conventional firewalls that lead to Distributed Firewalls are as follows.
" Depends on the topology of the network.
" Do not protect networks from the internal attacks.
" Unable to handle protocols like FTP and RealAudio.
" Has single entry point and the failure of this leads to problems.
" Unable to stop "spoofed" transmissions (i.e., using false source addresses).
" Unable to log all of the network's activity and unable to dynamically open and close their networking ports.
Reply

#3
Data Security in Local Network using Distributed Firewalls

Distributed firewalls are host-resident security software applications that protect the enterprise network s servers and end-user machines against unwanted intrusion. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. This is important because the most costly and destructive attacks still originate from within the organization.

They are like personal firewalls except they offer several important advantages like central management, logging, and in some cases, access-control granularity. These features are necessary to implement corporate security policies in larger enterprises. Policies can be defined and pushed out on an enterprise-wide basis.
A feature of distributed firewalls is centralized management. The ability to populate servers and end-users machines, to configure and push out consistent security policies helps to maximize limited resources. The ability to gather reports and maintain updates centrally makes distributed security practical. Distributed firewalls help in two ways. Remote end-user machines can be secured . Secondly, they secure critical servers on the network preventing intrusion by malicious code and jailing other such code by not letting the protected server be used as a launch pad for expanded attacks.
Reply

#4
to get information about the topic data security full report ,ppt and related topic refer the page link bellow

http://seminarsprojects.net/Thread-data-...anr-report

http://seminarsprojects.net/Thread-data-...ars-report

http://seminarsprojects.net/Thread-optic...a-security

http://seminarsprojects.net/Thread-data-...-firewalls

http://seminarsprojects.net/Thread-three...a-security

http://seminarsprojects.net/Thread-data-...pot-system

http://seminarsprojects.net/Thread-data-...ort?page=2

http://seminarsprojects.net/Thread-data-...ull-report

http://seminarsprojects.net/Thread-data-...lls?page=2
Reply

#5
there is some related pages you can read for Data security in wireless networks ,
http://seminarsprojects.net/Thread-data-...-firewalls
http://seminarsprojects.net/Thread-data-...anr-report
http://seminarsprojects.net/Thread-wirel...ull-report
http://seminarsprojects.net/Thread-secur...ull-report
http://seminarsprojects.net/Thread-borde...nsors-wins
Reply

#6
Hi, the report of this topic is available in this link:
http://dspace.cusat.ac.in:8080/dspace/bi...REWALL.pdf
Reply

#7

for more details, please go through the following thread
http://seminarsprojects.net/Thread-data-...d-firewall

Reply

#8
hey i want a full report and ppt of this topic [/b]
Data Security in Local Network using Distributed Firewalls
Reply

#9
Hi
can you please guide me to new projects on "Transactions on Cryptosystems"
please as soon as possible
Reply

#10
i am asking to u?what is laws and act of data security on local network using distributed firewalls
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.