DocumentCode :
2040150
Title :
Simulation of firewall and comparative study
Author :
Krishna, V. Anantha ; Victoire, T. Aruldoss Albert
Author_Institution :
Dept. of Comput. Sci. & Eng., Anna Univ. Coimbatore, Coimbatore, India
Volume :
4
fYear :
2011
fDate :
8-10 April 2011
Firstpage :
10
Lastpage :
14
Abstract :
Depending on the institution´s local policy, authentication may be restricted to computers located in offices in which there is an individual who is responsible for use of the machine. Such a policy may be enforced in order to provide some means of security against hacking remote services. The http server also handles a number of security issues. It is common practice to restrict access to a certain area of the file store. The network security must maintain confidentiality, integrity and availability to keep up web based applications secure and running. The basic premise of firewalls technology is to divide the total network environment into protected and unprotected zones. This paper deals with how to simulate the Firewall and Compare it with some other security system.
Keywords :
Internet; authorisation; computer network security; Web based application; file store access; firewall simulation; network security; remote service hacking security; Filtering; Fires; Internet; Logic gates; Protocols; Security; Servers; Firewall; protocol; security; threats;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics Computer Technology (ICECT), 2011 3rd International Conference on
Conference_Location :
Kanyakumari
Print_ISBN :
978-1-4244-8678-6
Electronic_ISBN :
978-1-4244-8679-3
Type :
conf
DOI :
10.1109/ICECTECH.2011.5941846
Filename :
5941846
Link To Document :
بازگشت