An Anomaly Free Distributed Firewall System for SDN

Author(s):  
Mitali Sinha ◽  
Padmalochan Bera ◽  
Manoranjan Satpathy
Author(s):  
Isiaka Ajewale Alimi

The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.


Author(s):  
Dalila Boughaci ◽  
Brahim Oubeka ◽  
Abdelkader Aissioui ◽  
Habiba Drias ◽  
Belaïd Benhamou

This chapter presents the design and the implementation of a decentralized firewall. The latter uses autonomous agents to coordinately control the traffic on the network. The proposed framework includes a set of controllers’ agents that ensure the packets filtering services, a proxy agent that plays a role of a proxy server and an identifier agent which is responsible for user authentication. The decentralization of the different agents’ activities is managed by an administrator agent which is a core point for launching the most important operations of the access control. A prototype has been designed and implemented. Furthermore, the authors hope that the underlying framework will inform researchers of a possible way to implement a decentralized firewall to improve the current solution, and will help readers understand the need for techniques and tools such as firewalls that are useful to protect their network traffic.


2012 ◽  
Vol 433-440 ◽  
pp. 4279-4283
Author(s):  
Xiao Bo Huang ◽  
Xiao Lin Huang ◽  
Quan Pu

To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing information leakage, techniques of identity authentication and content filtering are integrated into the mechanism of egress access control so that strategies with more flexibility in security auditing and access control can be implemented, which is effective to prevent the sensitive or secret data from leaking out and to trace the source of leakage.


Sign in / Sign up

Export Citation Format

Share Document