Data Security in Local Network using Distributed Firewalls
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
22-09-2008, 10:29 AM


Definition
Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls.

A distributed firewall is a mechanism to enforce a network domain security policy through the use of a policy language, a policy distribution scheme enabling policy control from a central point and certificates, enabling the identification of any member of the network policy domain.

Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization.They provide virtually unlimited scalability. In addition, they overcome the singlepoint-of-failure problem presented by the perimeter firewall.

Introduction
Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. This is important because the most costly and destructive attacks still originate from within the organization.
Evolution of Distributed Firewall from the Conventional Firewall :

A firewall is a collection of components, interposed between two networks, that filters traffic between them according to some security policy.

Basic structure of a firewall
Some problems with the conventional firewalls that lead to Distributed Firewalls are as follows.
" Depends on the topology of the network.
" Do not protect networks from the internal attacks.
" Unable to handle protocols like FTP and RealAudio.
" Has single entry point and the failure of this leads to problems.
" Unable to stop "spoofed" transmissions (i.e., using false source addresses).
" Unable to log all of the network's activity and unable to dynamically open and close their networking ports.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
sushmitapujari.2008@gmail.com
Active In SP
**

Posts: 1
Joined: Sep 2010
#2
04-09-2010, 09:10 PM

hi pls reply...i need full report on ths topic
Reply
than than
Active In SP
**

Posts: 1
Joined: Sep 2010
#3
12-09-2010, 10:21 PM

i want get full report of this topic.....
i want to get full report for this topic
Reply
projectsofme
Active In SP
**

Posts: 1,124
Joined: Jun 2010
#4
08-10-2010, 09:56 AM


.doc   DATA SECURITY IN A NETWORK TRANSMISSION.doc (Size: 57.5 KB / Downloads: 121)
This article is presented by:
ADEWOLE ADEBIYI CLEMENT
DATA SECURITY IN A NETWORK TRANSMISSION

ABSTRACT
This paper gives a topical overview of data security in network transmission. Internet network data security has assumed great importance since the quantum of mission critical data that is being compromised has assumed great proportions. In fact, internet network data security is now a leading cause of national security concerns worldwide.
Even in corporate , internet network data security topics in the form of intrusions into corporate mission critical data often invades the corporate boardrooms, where black coated directors (who have hardly used a computer in their life) debate on internet networking security strategies.

INTRODUCTION
The requirements of data security have undergone three major changes in the last decades. The first major change was the introduction of the computer. The need for protecting files and information became evident. Collection of tools designed to protect data and to avoid hacker attacks has the generic name computer security. The second major change was the introduction of distributed systems, networks and communication facilities for data communication. Network security measures are needed to protect data during transmission. The third change is the current, rapid development of wireless networks and mobile communications. Wireless security is therefore of high priority today.

DEFINITIONS OF TERMS
Address mapping: By translating network addresses from one format to another, this methodology permits different protocols to operate interchangeably.

Address mask: A bit combination descriptor identifying which portion of an address refers to the network or subnet and which part refers to the host sometimes simply called the mask.

Area: A logical, rather than physical, set of segments along with their attached devices. Areas are commonly connected to others using routers to create a single autonomous system.

ATM (Asynchronous Transfer Mode): The international standard, identified by fixed-length 53-byte cells, for transmitting cells in multiple service systems, such as voice, video, or data. Transit delays are reduced because the fixed-length cells permit processing to occur in the hardware. ATM is designed to maximize the benefits of high-speed transmission media, such as SONET, E3, and T3.

Bandwidth: The gap between the highest and lowest frequencies employed by network signals. More commonly, it refers to the rated throughput capacity of a network protocol or medium.
Shy


Reply
shrutiveena
Active In SP
**

Posts: 2
Joined: Oct 2010
#5
22-10-2010, 10:35 PM

I want full report on Data security in Local Network using Distributed firewall
Reply
nyat
Active In SP
**

Posts: 1
Joined: Oct 2010
#6
23-10-2010, 04:59 AM

Hello there?
Can pliz get a full tutorial on Data Security in Local Network using Distributed Firewalls
Reply
Wifi
Active In SP
**

Posts: 158
Joined: Oct 2010
#7
23-10-2010, 09:11 AM

Hi, the report of this topic is available in this link:
dspace.cusat.ac.in:8080/dspace/bitstream/123456789/2112/1/DATA%20SECURITY%20IN%20LOCAL%20NETWORK%20USING%20DISTRIBUTED%20FIREWALL.pdf
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
shrutiveena
Active In SP
**

Posts: 2
Joined: Oct 2010
#8
23-10-2010, 11:22 PM

Hi
can you please guide me to new project and implimentations on "Transactions on Cryptosystems"
please as soon as possible
Reply
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#9
04-04-2011, 12:35 PM

there is some related pages you can read for Data security in wireless networks ,
topicideashow-to-data-security-in-local-network-using-distributed-firewalls
topicideashow-to-data-security-in-wireless-networks-download-semianr-report
topicideashow-to-wireless-lan-security-full-report
topicideashow-to-security-in-ad-hoc-wireless-networks-full-report
topicideashow-to-border-security-using-wireless-integrated-network-sensors-wins
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#10
03-02-2012, 10:32 AM

to get information about the topic data security full report ,ppt and related topic refer the link bellow

topicideashow-to-data-security-in-wireless-networks-download-semianr-report

topicideashow-to-data-security-download-seminar and presentation-report

topicideashow-to-optical-disc-data-security

topicideashow-to-data-security-in-local-network-using-distributed-firewalls

topicideashow-to-three-dimensional-object-used-for-data-security

topicideashow-to-data-security-using-honey-pot-system

topicideashow-to-data-security-in-wireless-networks-download-semianr-report?page=2

topicideashow-to-data-security-an-information-theoretic-model-for-steganography-full-report

topicideashow-to-data-security-in-local-network-using-distributed-firewalls?page=2
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 170 21-10-2015, 12:10 PM
Last Post: mkaasees
  Load Rebalancing for Distributed File Systems in Clouds seminar tips 3 1,805 13-04-2015, 05:21 PM
Last Post: shilpavpius
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,449 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 289 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 291 13-02-2015, 02:01 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 333 29-01-2015, 01:15 PM
Last Post: jaseelati
  cloud data protection for the masses project documentation jaseelati 0 335 21-01-2015, 04:19 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 304 17-01-2015, 04:13 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 424 06-01-2015, 04:47 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 338 30-12-2014, 03:23 PM
Last Post: jaseelati