Data Security in Local Network using Distributed Firewalls
#1

Definition
Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls.

A distributed firewall is a mechanism to enforce a network domain security policy through the use of a policy language, a policy distribution scheme enabling policy control from a central point and certificates, enabling the identification of any member of the network policy domain.

Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization.They provide virtually unlimited scalability. In addition, they overcome the singlepoint-of-failure problem presented by the perimeter firewall.

Introduction
Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. This is important because the most costly and destructive attacks still originate from within the organization.
Evolution of Distributed Firewall from the Conventional Firewall :

A firewall is a collection of components, interposed between two networks, that filters traffic between them according to some security policy.

Basic structure of a firewall
Some problems with the conventional firewalls that lead to Distributed Firewalls are as follows.
" Depends on the topology of the network.
" Do not protect networks from the internal attacks.
" Unable to handle protocols like FTP and RealAudio.
" Has single entry point and the failure of this leads to problems.
" Unable to stop "spoofed" transmissions (i.e., using false source addresses).
" Unable to log all of the network's activity and unable to dynamically open and close their networking ports.
Reply
#2
hi pls reply...i need full report on ths topic
Reply
#3
i want get full report of this topic.....
i want to get full report for this topic
Reply
#4
Thumbs Up 
[attachment=5364]
This article is presented by:
ADEWOLE ADEBIYI CLEMENT
DATA SECURITY IN A NETWORK TRANSMISSION

ABSTRACT
This paper gives a topical overview of data security in network transmission. Internet network data security has assumed great importance since the quantum of mission critical data that is being compromised has assumed great proportions. In fact, internet network data security is now a leading cause of national security concerns worldwide.
Even in corporate , internet network data security topics in the form of intrusions into corporate mission critical data often invades the corporate boardrooms, where black coated directors (who have hardly used a computer in their life) debate on internet networking security strategies.

INTRODUCTION
The requirements of data security have undergone three major changes in the last decades. The first major change was the introduction of the computer. The need for protecting files and information became evident. Collection of tools designed to protect data and to avoid hacker attacks has the generic name computer security. The second major change was the introduction of distributed systems, networks and communication facilities for data communication. Network security measures are needed to protect data during transmission. The third change is the current, rapid development of wireless networks and mobile communications. Wireless security is therefore of high priority today.

DEFINITIONS OF TERMS
Address mapping: By translating network addresses from one format to another, this methodology permits different protocols to operate interchangeably.

Address mask: A bit combination descriptor identifying which portion of an address refers to the network or subnet and which part refers to the host sometimes simply called the mask.

Area: A logical, rather than physical, set of segments along with their attached devices. Areas are commonly connected to others using routers to create a single autonomous system.

ATM (Asynchronous Transfer Mode): The international standard, identified by fixed-length 53-byte cells, for transmitting cells in multiple service systems, such as voice, video, or data. Transit delays are reduced because the fixed-length cells permit processing to occur in the hardware. ATM is designed to maximize the benefits of high-speed transmission media, such as SONET, E3, and T3.

Bandwidth: The gap between the highest and lowest frequencies employed by network signals. More commonly, it refers to the rated throughput capacity of a network protocol or medium.
Shy


Reply
#5
I want full report on Data security in Local Network using Distributed firewall
Reply
#6
Music 
Hello there?
Can pliz get a full tutorial on Data Security in Local Network using Distributed Firewalls
Reply
#7
Hi, the report of this topic is available in this link:
http://dspace.cusat.ac.in:8080/dspace/bi...REWALL.pdf
Reply
#8
Hi
can you please guide me to new projects on "Transactions on Cryptosystems"
please as soon as possible
Reply
#9
there is some related pages you can read for Data security in wireless networks ,
http://studentbank.in/report-data-securi...-firewalls
http://studentbank.in/report-data-securi...anr-report
http://studentbank.in/report-wireless-la...ull-report
http://studentbank.in/report-security-in...ull-report
http://studentbank.in/report-border-secu...nsors-wins
Reply
#10
to get information about the topic data security full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-data-securi...anr-report

http://studentbank.in/report-data-securi...ars-report

http://studentbank.in/report-optical-disc-data-security

http://studentbank.in/report-data-securi...-firewalls

http://studentbank.in/report-three-dimen...a-security

http://studentbank.in/report-data-securi...pot-system

http://studentbank.in/report-data-securi...ort?page=2

http://studentbank.in/report-data-securi...ull-report

http://studentbank.in/report-data-securi...lls?page=2
Reply
#11
i am asking to u?what is laws and act of data security on local network using distributed firewalls
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: google local marketing tips, network security 10ec832 question, firewalls for dummies, distributed ic, the geometric efficient matching algorithm for firewalls modules, data security compliance, local radar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network attached storage computer science crazy 3 12,456 20-02-2019, 01:16 PM
Last Post:
  network security seminars report computer science technology 14 20,385 24-11-2018, 01:19 AM
Last Post:
  Block Chain and Data Science jntuworldforum 0 7,962 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  Data Encryption Standard (DES) seminar class 2 9,333 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 6,981 23-12-2015, 04:18 PM
Last Post: HelloGFS
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,244 10-02-2015, 05:52 PM
Last Post: seminar report asees
  Firewalls computer science crazy 4 2,763 15-11-2014, 10:55 PM
Last Post: jaseela123d
Brick XML Data Compression computer science crazy 2 2,379 07-10-2014, 09:26 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,056 07-08-2014, 11:32 PM
Last Post: [email protected]
  GREEN CLOUD -A Data Center Approach computer topic 0 1,530 25-03-2014, 10:13 PM
Last Post: computer topic

Forum Jump: