A Study on Firewall System, Scheduling and Routing using pfsense Scheme

Author(s):  
P. SenthilKumar ◽  
M. Muthukumar
Keyword(s):  
Author(s):  
Isiaka Ajewale Alimi

The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.


2012 ◽  
Vol 433-440 ◽  
pp. 4279-4283
Author(s):  
Xiao Bo Huang ◽  
Xiao Lin Huang ◽  
Quan Pu

To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing information leakage, techniques of identity authentication and content filtering are integrated into the mechanism of egress access control so that strategies with more flexibility in security auditing and access control can be implemented, which is effective to prevent the sensitive or secret data from leaking out and to trace the source of leakage.


Author(s):  
Vasaka Visoottiviseth ◽  
Suthasinee Lertviriyasawat ◽  
Peerada Suppiyatrakoon ◽  
Pattarajit Chitkornkitsil ◽  
Nariyoshi Yamai

Author(s):  
Siti Aisyah

Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.


2021 ◽  
Vol 1 (7) ◽  
pp. 184-188
Author(s):  
E. L. PATOKINA ◽  

The article reveals the features of the application of marketing strategies in the market of the People's Republic of China. The Chinese market is significantly different from the European, American and Russian ones, moreover, this consumer segment is least disclosed in the works of Russian authors. Despite the fact that the great Chinese firewall system imposes some restrictions on the dissemination of foreign information within China and thus restricts access to this market, there are ways and methods available to Russian businesses. Some of them are described in this article and represent a full-fledged system consisting of both trading platforms and marketing tools. The scope of application of the research results is the foreign trade of Russian small and medium-sized businesses in the Asia-Pacific region.


Sign in / Sign up

Export Citation Format

Share Document