Downloads: 162 | Views: 298
Research Paper | Computer Science & Engineering | India | Volume 7 Issue 3, March 2018 | Popularity: 6.8 / 10
FireMAN: Next Generation Firewall Systems Design using Data Mining
Nareshkumar D. Harale, Dr. B. B. Meshram
Abstract: Network security is main issue of this generation of computing because cyber-attacks are increasing day by day in terms diversity and complexity. Establishing a network is not a big issue for network administrators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper mainly emphasize on the network security also we present some major issues that can affect our network. Also key objective is to build a comprehensive firewall that can secure a computer from outside threat, monitor data that flows into, filter if objectionable and forward if it pertains to the set standards and polices. The user should be able to set various policies for filtering without having to go into the details of its implementation. Also, the user should be having administrative privileges, so as to safeguard the integrity of the system. The defined rules are applied on the packets and its contents flowing into and outside the system In addition to this, the firewall should implement filtering of data at the application level. Also a port scanning utility would be an added advantage in determining the various intrusion attempts into the computing systems. Meanwhile, stress should be given on the ease of use and user friendliness of the system.
Keywords: Network Attacks, Network Intrusion, Port Scanning, Intrusion Protection, Data Mining, Firewall Systems, Packet Filtering, Data Filtering, Network Security
Edition: Volume 7 Issue 3, March 2018
Pages: 629 - 642
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 102
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1612 - 1616Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
Vishal Mahale, Deepali Gothawal
Downloads: 108
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1262 - 1265A Survey on IP Traceback Mechanisms
Aparna C Bhadran, Maria Joy
Downloads: 109
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1982 - 1985Review: Firewall Privacy Preservation By Packet Filtering Management
Akshay Dattatray Kachare, Geeta Atkar
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017
Pages: 1588 - 1590Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Apurva J. Shastri, S. R. Tandle