Open Access
Subscription Access
Firewall Approach to Computer Network Security: Functional Viewpoint
In today’s modern world, most businesses, regardless of size believes that access to the internet is essential to compete effectively in the industry. Yet, connecting a personal or corporate computers to the internet could expose personal or confidential data to malicious attack from anywhere since unprotected connections to the internet makes computer users vulnerable to attacker, hacker, virus, and other internet threats. Therefore, firewall is introduced to provide high degree of protection to the network and network users. This work is concerned with the design and implementation with firewall approach to network security as a means of protecting both individual and corporate network from hostile intrusion coming through internet connectivity. Conclusively, this system proposed is built based on the packet filtering mechanism to control or filter all the packets coming in and leaving the protected site using IP address, and port number of the TCP/IP packet. It was discovered that firewall approach is more robust as it combined capability of other methods like packet filtering, port scanning etc.
Keywords
Attacker, Firewall, Hacker, Virus, Internet Threats, TCP/IP Packet, Packet Filtering, Network Users.
User
Font Size
Information
- Aaron B. (2017). Introduction to Firewalls. [White Paper]. Retrieved from http://routeralley.com/.
- Avishai W. (2017). Packet Filtering and Stateful Firewalls. School of Electrical Engineering, Tel Aviv University, unpublished
- Bhovare, S. R., & Chaudhari, B. K. (2015). A Survey on Data Security Provided in Local Network Using Distributed Firewall. International Journal of Research in Advent Technology, Vol. 2, No. 4, April 2014, E-ISSN: 2321-9637, pp: 169171.
- Chenghua T. et al., (2018). Assessment of Network Security Policy Based on Security Capability. Proceedings of the 2008 International Conference on Computer Science and Software Engineering. December 12 – December 14, Wuhan, China.
- David W. (2014). Network Firewall Technologies. Proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking, September 15 – September 18, Bled, Slovenia.
- Escamilla T. (2018) "Intrusion Detection Network Security Beyond the Firewall", John Wiley & Sons Inc, pg 63-71 Matt W. (2005). An Evaluation of Firewall Technologies. Coursework paper, University of Virginia, USA
- Rathod R. et al., (2016). Role of Distributed Firewalls in Local Network for Data Security. International Journal of Computer Science and Applications, Vol.3
- Warade S. Et al., (2016). Data Security in Local Network using Distributed Firewall: A Review. International Journal of Computer Applications (0975-8887), National Conference on Emerging Trends in Computer Technology (NCETCT-2016), pp: 19-21
- Warlock M. (2019). Evaluation of Firewall Technologies in Network Security. Coursework paper, University of Virginia, USA.
- Yekini N. A., Aigbokhan E. E., & Okikiola F. M. (2014). Cryptography System for Online Communication Using Polyalphabetic Substitution Method. Int. J. Advanced Networking and Applications 2151 Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN: 0975-0290
- Yekini N.A., Oloyede A.O., & Akinwowle A.K. (2020): Cybernetic Communication Roles in Managing
- Corona Virus Pandemic Risk: Nigeria Case. Int. J. Advanced Networking and Applications Volume: 11 Issue: 06 Pages: 4471-4477 (2020) ISSN: 0975-0290
- Zwiky E et al., (2016)"Building Internet Firewalls", Second Edition, O'relly & Association, pg 14-19.
Abstract Views: 174
PDF Views: 0