Thread Rating:
  • 1 Vote(s) - 1 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Data Security in Local Network using Distributed Firewalls
Post: #1

Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls.

A distributed firewall is a mechanism to enforce a network domain security policy through the use of a policy language, a policy distribution scheme enabling policy control from a central point and certificates, enabling the identification of any member of the network policy domain.

Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization.They provide virtually unlimited scalability. In addition, they overcome the singlepoint-of-failure problem presented by the perimeter firewall.

Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. This is important because the most costly and destructive attacks still originate from within the organization.
Evolution of Distributed Firewall from the Conventional Firewall :

A firewall is a collection of components, interposed between two networks, that filters traffic between them according to some security policy.

Basic structure of a firewall
Some problems with the conventional firewalls that lead to Distributed Firewalls are as follows.
" Depends on the topology of the network.
" Do not protect networks from the internal attacks.
" Unable to handle protocols like FTP and RealAudio.
" Has single entry point and the failure of this leads to problems.
" Unable to stop "spoofed" transmissions (i.e., using false source addresses).
" Unable to log all of the network's activity and unable to dynamically open and close their networking ports.
Post: #2
hi pls reply...i need full report on ths topic
Post: #3
i want get full report of this topic.....
i want to get full report for this topic
Post: #4
Thumbs Up 
This article is presented by:

This paper gives a topical overview of data security in network transmission. Internet network data security has assumed great importance since the quantum of mission critical data that is being compromised has assumed great proportions. In fact, internet network data security is now a leading cause of national security concerns worldwide.
Even in corporate , internet network data security topics in the form of intrusions into corporate mission critical data often invades the corporate boardrooms, where black coated directors (who have hardly used a computer in their life) debate on internet networking security strategies.

The requirements of data security have undergone three major changes in the last decades. The first major change was the introduction of the computer. The need for protecting files and information became evident. Collection of tools designed to protect data and to avoid hacker attacks has the generic name computer security. The second major change was the introduction of distributed systems, networks and communication facilities for data communication. Network security measures are needed to protect data during transmission. The third change is the current, rapid development of wireless networks and mobile communications. Wireless security is therefore of high priority today.

Address mapping: By translating network addresses from one format to another, this methodology permits different protocols to operate interchangeably.

Address mask: A bit combination descriptor identifying which portion of an address refers to the network or subnet and which part refers to the host sometimes simply called the mask.

Area: A logical, rather than physical, set of segments along with their attached devices. Areas are commonly connected to others using routers to create a single autonomous system.

ATM (Asynchronous Transfer Mode): The international standard, identified by fixed-length 53-byte cells, for transmitting cells in multiple service systems, such as voice, video, or data. Transit delays are reduced because the fixed-length cells permit processing to occur in the hardware. ATM is designed to maximize the benefits of high-speed transmission media, such as SONET, E3, and T3.

Bandwidth: The gap between the highest and lowest frequencies employed by network signals. More commonly, it refers to the rated throughput capacity of a network protocol or medium.
Post: #5
I want full report on Data security in Local Network using Distributed firewall
Post: #6
Hello there?
Can pliz get a full tutorial on Data Security in Local Network using Distributed Firewalls
Post: #7
Hi, the report of this topic is available in this link:
Post: #8
can you please guide me to new projects on "Transactions on Cryptosystems"
please as soon as possible
Post: #9
there is some related pages you can read for Data security in wireless networks ,
Post: #10
to get information about the topic data security full report ,ppt and related topic refer the link bellow
Post: #11
i am asking to u?what is laws and act of data security on local network using distributed firewalls

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar report on firewalls, data security compliance, vasco data security, network security, firewalls technical seminar documentation, rakesh shetty network security, firewalls appliances,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Data Encryption Standard (DES) seminar class 2 1,844 20-02-2016 01:59 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 5,558 23-12-2015 04:18 PM
Last Post: HelloGFS
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 7,179 10-02-2015 05:52 PM
Last Post: seminar report asees
  Firewalls computer science crazy 4 1,920 15-11-2014 10:55 PM
Last Post: jaseela123
Brick XML Data Compression computer science crazy 2 1,497 07-10-2014 09:26 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 17,230 07-08-2014 11:32 PM
Last Post: [email protected]
  GREEN CLOUD -A Data Center Approach computer topic 0 663 25-03-2014 10:13 PM
Last Post: computer topic
  3D-OPTICAL DATA STORAGE TECHNOLOGY computer science crazy 3 7,071 12-09-2013 08:28 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 2,364 12-08-2013 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 4,024 27-07-2013 01:06 PM
Last Post: computer topic