Volume- 2
Issue- 6
Year- 2014
Mr D.Shiva rama krishna , Mr K.Siva Rama Prasad, Mr Ch.v.v.Narasimha Raju
In the real world a firewall is a solid barrier between a precious asset on one side and a hazard on the other. Firewalls are often used to protect an organization from hazards on the Internet but they can, and probably should, also be used within an organization to separate different departments, working areas or networks. Locked offices and buildings cannot protect information if the computers holding it are open to everybody on the network. Firewall has many shortages, such as it cannot keep away interior attacks, it cannot provide a consistent security strategy, and it has a single bottleneck spot and invalid spot, etc. The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Intrusion Prevention Systems (IPS) evolved after that to resolve ambiguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers.IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do.
[1] E. Guillen, D. Padilla, and Y. Colorado, “based Intrusion Detection and Prevention Systems,” Latin-American Conference Communications, 2009, pp. 0-4.
[2] B. Cao, Z. Zhihong, L. Tie, Y. Zhongde, and L. Jiren, “A Study on Performance Improvement of Gateway Anti-Virus System Based on File Scanning,” Control and Decision Conference 09, 2009, pp. 2293-2295.
[3] T. Ghorbani, A.A., Lu, W., Network Intrusion Detection and Prevention : Concepts and Technique, Springer, 2009.
[4] Bace, Rebecca, and Peter Mell. “ Intrusion Detection Systems.” URL:
[5] Bobbitt, Mike. “Inhospitable Hosts.” Information Security. Volume 5, No.10 (2002): 35-47.
[6] Carter, Earl, and Rick Stiffler. Cisco Secure Intrusion Detection System. Pearson Education, 2001.
[7]Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab Al-Shaer,“Analysis of Firewall Policy Rules Using Data Mining Techniques”,Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP.
[8] Eugene Spafford, Diego Zamboni, “Data Collection MechanismsFor Intrusion Detection” Conference (IM’2003), March 2003. E. Al-Shaer and H. Hamed.
[9] “Firewall Policy Advisor for Anomaly Detection and Rule Editing.”IEEE/IFIP Integrated Management
[10]Ehab Al-Shaer and Hazem Hamed, "Discovery of Policy Anomaliesin Distributed Firewalls" in Proc. Of IEEE INFOCOMM'04, vol. 23,no. 1, March 2004 pp. 2605-2616
Computer Science and Engineering, MLR Institute of Technology & management, Hyderabad, India, 9492673201.,
No. of Downloads: 5 | No. of Views: 1166
Lingxi Xiao, Ruilin Xu, Yiru Cang, Yan Chen, Yijing Wei.
May 2024 - Vol 12, Issue 3
Anuj Kumar Kem, Ayush Chauhan, Mohan Agnihotri, Aniruddh Kumar.
May 2024 - Vol 12, Issue 3
Pravek Sharma, Dr. Rajesh Tyagi, Dr. Priyanka Dubey.
May 2024 - Vol 12, Issue 3