Title :
Simulation of firewall and comparative study
Author :
Krishna, V. Anantha ; Victoire, T. Aruldoss Albert
Author_Institution :
Dept. of Comput. Sci. & Eng., Anna Univ. Coimbatore, Coimbatore, India
Abstract :
Depending on the institution´s local policy, authentication may be restricted to computers located in offices in which there is an individual who is responsible for use of the machine. Such a policy may be enforced in order to provide some means of security against hacking remote services. The http server also handles a number of security issues. It is common practice to restrict access to a certain area of the file store. The network security must maintain confidentiality, integrity and availability to keep up web based applications secure and running. The basic premise of firewalls technology is to divide the total network environment into protected and unprotected zones. This paper deals with how to simulate the Firewall and Compare it with some other security system.
Keywords :
Internet; authorisation; computer network security; Web based application; file store access; firewall simulation; network security; remote service hacking security; Filtering; Fires; Internet; Logic gates; Protocols; Security; Servers; Firewall; protocol; security; threats;
Conference_Titel :
Electronics Computer Technology (ICECT), 2011 3rd International Conference on
Conference_Location :
Kanyakumari
Print_ISBN :
978-1-4244-8678-6
Electronic_ISBN :
978-1-4244-8679-3
DOI :
10.1109/ICECTECH.2011.5941846