Abstract
In the last decade, the number of users connecting with Web has increased by multiple folds. As the number of users is increasing, naturally, the network’s computability load will also increase, which creates the challenges to network in terms of security threats and attacks. At this juncture, the network security plays key-role by using the firewall which is considered as one of most immediate requirements assuring the users about the network security. With expansion of the size of network, it is also required to improve the security road map implementation; otherwise, it would be tough for users to rely on network-based services. In this article, a novel idea has been proposed to cater the avoidance of threats and attack in organization’s network by expanding the scope of firewall policies. The chapter shows the importance of network design and firewall rules compatibility to make network free from threats and attacks.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Hu, H., Ahn, G.J., Kulkarni, K.: Detecting and resolving firewall policy anomalies. IEEE Trans. Dependabale Secure Comput. 08(3) (2012)
Wool, A.: A quantitative study of firewall configuration errors. Published by IEEE Society (2004)
Harrington, J.L.: Network security: a practical approach. Elsevier (2011)
Solanki, V.K., Singh, K.P., Venkatesan, M.: Firewalls best practices in the organization. In: CTNGC-2012 held in Institute of Technology and Science, Ghaziabad, UP, Proceedings of CTNGC/Number 3 (ISBN: 973-93-80870-14-1) in Int. J. Comput. Appl. NY, USA and ACM-NCR Chapter, 20th Oct 2012
Solanki, V.K., Singh, K.P., Venkatesan M., Tamilselvan, S.: A holistic approach to secure network using firewalls. FACT’12, vol. 1, pp. 48–56 in National Institute of Technology, Tiruchirrappali, TN, 6th–7th Dec 2012
Solanki, V.K., Singh, K.P., Venkatesan, M., Raghuwanshi, S.: Firewall policies enhancement strategies towards securing networks. In: IEEE Conference technically co-sponsored by IEEE Kerala Section and IEEE India Council, Information Communication Technologies (ICT-13), pp. 07–11. ISBN: 978-1-4673-5757-9, 11th–12th April 2013 Organized by Noorul Islam University, Kanyakumari, Tamilnadu
Pfleegar, C.P., Pfleegar, S.L.: Security in computing, 4th edn. Pearson Prentice Hall (3rd edn) (2007)
Seagren, E., Noonan, W.J.: Secure your network for free. Elsevier Professional and Trade Series Edition (2007)
Stojanovski, N., Gusev, M.: Architecture of a identity based firewalls system. Int. J. Netw. Secur. Appl. 3(4) (2011)
Lieu, A.X.: Change-impact analysis of firewall policies, ESORICS 2007, LNCA 4734, pp. 155–170. Springer, Berlin Heidlberg (2007)
Whitman, M.E., Mattord, H.J.: Principles of information security. Vikas Publishing House, New Delhi (2004)
Horowitz, E., Sahni, S., Rajasekharan, S.: Computer algorithm/C ++, 2nd edn. Universities Press
Solanki, V.K., Venkatesan, M.: An evolution and revolution of network security. ICACT’2012 held in JKK Nattaraja College of Engineering and Technology, Nammakal, TN, 9th–10th March 2012
Acknowledgments
We are thankful to Prof. A. V. Vijayshankar for providing quality input in this paper. We give our thanks to system administrator and team for cooperating with us during many odd hours. We further extend our sincere thanks to the ICACNI-13 Conference organizer for permitting us to share our research idea before the researchers, academicians, and corporate persons.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Solanki, V.K., Singh, K.P., Venkatesan, M., Raghuwanshi, S. (2014). Securing Networks Using Situation-Based Firewall Policy Computations. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_105
Download citation
DOI: https://doi.org/10.1007/978-81-322-1665-0_105
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1664-3
Online ISBN: 978-81-322-1665-0
eBook Packages: EngineeringEngineering (R0)