<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 2 Issue 6</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science and Engineering</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>November - December 2014</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2019</Year>
        <Month>11</Month>
        <Day>25</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>A Comparative Study of Firewall and Intrusion Prevention System</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>36</FirstPage>
      <LastPage>39</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Mr D.Shiva rama krishna</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Mr K.Siva Rama Prasad</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
                    <FirstName>Mr Ch.v.v.Narasimha Raju</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI></DOI>
      <Abstract>In the real world a firewall is a solid barrier between a precious asset on one side and a hazard on the other. Firewalls are often used to protect an organization from hazards on the Internet but they can, and probably should, also be used within an organization to separate different departments, working areas or networks. Locked offices and buildings cannot protect information if the computers holding it are open to everybody on the network. Firewall has many shortages, such as it cannot keep away interior attacks, it cannot provide a consistent security strategy, and it has a single bottleneck spot and invalid spot, etc. The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Intrusion Prevention Systems (IPS) evolved after that to resolve ambiguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers.IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>firewall. Intrusion Prevention Systems (key words)</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=116</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>