Distributed Firewall with Dynamic Intrusion Detection Module

Total Page:16

File Type:pdf, Size:1020Kb

Distributed Firewall with Dynamic Intrusion Detection Module International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 12, Issue 4, April 2021, pp. 484-491, Article ID: IJARET_12_04_046 Available online at https://iaeme.com/Home/issue/IJARET?Volume=12&Issue=4 ISSN Print: 0976-6480 and ISSN Online: 0976-6499 DOI: 10.34218/IJARET.12.4.2021.046 © IAEME Publication Scopus Indexed DISTRIBUTED FIREWALL WITH DYNAMIC INTRUSION DETECTION MODULE Dr. Zalte S.S. Department of Computer Science, Shivaji University, Kolhapur, India Patil P.N Department of Computer Science, Vishwakarma College of Arts, Commerce and Science, Pune, India Deshmukh S.N. Department of Computer Science, Vishwakarma College of Arts, Commerce and Science, Pune, India ABSTRACT Computers and Internet, both are becoming an essential part of life. With computer networks we are sharing resources, exchanging information, and number of personal transactions which must be secured from unauthorized access, with Network Security we can prevent and detect unauthorized access. So, we can maintain integrity, confidentiality and accessibility of computer networks. One way to achieve Network Security is FIREWALL. A firewall is a system which monitors and filters traffic and gives entry/ blocks data packets based on a set of security rules. Distributed firewall is introduced to eliminate the problems which are difficult to solved in conventional firewalls. Distributed firewall is not restricted by topology and entry point as conventional firewall. Distributed firewall secure critical network endpoints, it provides unlimited Scalability and overcomes single point of failure problems. In this paper, we have proposed Distributed Firewall with Dynamic Intrusion Detection Module to achieve elevated security to the network. Key words: Network Security, Distributed Firewall, computer networks, Policy, Threats, Intrusion Detection. Cite this Article: Zalte S.S, Patil P.N and Deshmukh S.N, Distributed Firewall with Dynamic Intrusion Detection Module, International Journal of Advanced Research in Engineering and Technology, 12(4), 2021, pp. 484-491. https://iaeme.com/Home/issue/IJARET?Volume=12&Issue=4 https://iaeme.com/Home/journal/IJARET 484 [email protected] Distributed Firewall with Dynamic Intrusion Detection Module 1. INTRODUCTION In a pandemic situation, the internet network has become an essential part of our life. Every second, the number of personal transactions occurs with the use of the Internet. Rather than processing, computer networks are mostly used only for transmission of information and data. To prevent hacking of confidential data or unauthorized access or virus attack, network security is vital. With a firewall we can accomplish network security. A firewall is a hardware device or set of instructions between two networks that filters the traffic and allows or denies access to the sensitive data transmission through the network following some security rules. Firewall prevents access to unauthorized users and provides protection from outside cyber attackers by defending computers or networks from malware or unnecessary network traffic. A firewall creates a barrier between an untrusted network and a trusted network. 2. CONVENTIONAL FIREWALL A firewall is a mechanism that supervises and filters in and outgoing network traffic based on predetermined security rules [1]. There are some policies and codes to protect data from outside networks. Data may be hacked within the organization. Most destructive attacks can occur inside the network due to no restriction in the internal network. Some drawbacks of conventional firewall as follows: • Convectional firewall heavily depends on network topology [2]. • In conventional firewalls there may be risk of internal network attack. • Not all protocols are handled in conventional firewalls. • There is a single-entry point and failure of this leads to problems. • Log record is not maintained for all network activities. • Cannot enforce Password policy and its prevention from misuse. Figure 1 3. DISTRIBUTED FIREWALL DESIGN Distributed firewalls are host-resident security domain software applications that protect the enterprise network’s servers and end-user machines against unwanted Intrusion and secure the network by protecting serious points, exactly where hackers want to enter [3]. They are like private firewalls excluding they offer several important advantages like central management, logging, and in some cases, access-control granularity. These topographies are necessary to implement corporate security policies in larger enterprises. https://iaeme.com/Home/journal/IJARET 485 [email protected] Zalte S.S, Patil P.N and Deshmukh S.N Distributed firewalls solved the single point-of failure problem presented by the firewall. A feature of distributed firewalls is centralized management. To give consistent security policies helps and maximizes limited resources it gives the ability to populate Servers and end-users’ machines to configure. Distributed firewalls help in two ways. Remote end-user machines can be secured. Secondly, they secure critical network endpoints where hackers want to enter. Preventing intrusion by malicious code and detaining other such code by not letting the protected server be used as a launch pad for expanded attacks. Distributed firewall allows implementation of security policy without restricting topology in and outside point of view. 4. COMPONENTS OF DISTRIBUTED FIREWALL Policy Language: The policy language is the set of rules used to create policies for each of the firewalls., which direct the firewall in how to evaluate the network traffic. security policy language describes what connections are permitted or prohibited. After policy is getting compiled it is shipped to the end points. Policy Distribution: The system management tools are used to allocate the policy to the firewalls and to collect logging and reporting information. The policy distribution mechanism should guarantee the integrity of the policy during transfer [4]. This policy is checked before processing the incoming or outgoing messages. The distribution of the policy can be different and differs with the implementation. It can be either directly pushed to the internet host, or pulled when necessary, or it may even be provided credentials to the users when they try to communicate with the hosts. Policies are distributed according to one of the following distribution schemes: • Policies as well as authorizations can be pushed to every single end point in the policy domain. • Policies and authorizations can be pulled from a trusted repository during initialization. • Policies are pulled during initialization of the policy verifier whereas authorizations for authentication mechanisms remain on a trusted repository and are requested whenever communication traffic is reaching a node from a yet unknown host. Certificate For identification of a particular host there may be the chance of using an IP address, distributed firewalls mechanism of security is more important [2]. It is preferred to use certificates to identify hosts. IPsec provides cryptographic certificates. To secure network traffic and the transmission of policies. Source can then be uniquely verified by their certificate. It is about analyzing and constructing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data privacy, data integrity, authentication and non-repudiation. Unlike IP addresses, which can be easily spoofed, the digital certificate is much more secure and the authentication of the certificate is not easily forged. Policies are distributed by means of these certificates. In implementation of distributed firewall technology, policy languages are translated into some internal format by a compiler. This policy file is distributed to all the protected hosts by the system management software. A mechanism applies the security policy to incoming packets or connections and the incoming packet accepted or rejected by each host according to policy and the cryptographically verified identity of each sender (Ioannidis). Different variations may exist in implementation of distributed firewall technology. These variations are called a hybrid firewall, which is a combination of traditional firewall and distributed firewall. https://iaeme.com/Home/journal/IJARET 486 [email protected] Distributed Firewall with Dynamic Intrusion Detection Module 5. POLICIES The security policies transmitted from the central management server have to be applied by the user-end. The end-user part of the Distributed Firewall does give any organizational control for the network administrator to control the implementation of security policies. The end-user allows traffic based on the security rules it has implemented. A “security policy” defines the security guidelines of a system. Without a distinct security policy, there is no way to know what access is permitted or rejected. A simple example for a firewall is: a) It Allow all connections to the web server. Reject all other access. b) The distribution of the policy can be varying with the implementation. It can be either directly sent to end systems, or received when necessary. Pull Technique: Pull Technique While booting up, hosts knock to the central management server to verify whether the central management server is up and live [4]. It registers with the central management server and sends requests for its policies which it should implement. The central management server offers the host with its security policies.
Recommended publications
  • Adaptive Distributed Firewall Using Intrusion Detection Lars Strand
    UNIVERSITY OF OSLO Department of Informatics Adaptive distributed firewall using intrusion detection Lars Strand UniK University Graduate Center University of Oslo lars (at) unik no 1. November 2004 ABSTRACT Conventional firewalls rely on a strict outside/inside topology where the gateway(s) enforce some sort of traffic filtering. Some claims that with the evolving connectivity of the Internet, the tradi- tional firewall has been obsolete. High speed links, dynamic topology, end-to-end encryption, threat from internal users are all issues that must be addressed. Steven M. Bellovin was the first to propose a “distributed firewall” that addresses these shortcomings. In this master thesis, the design and implementation of a “distributed firewall” with an intrusion detection mechanism is presented using Python and a scriptable firewall (IPTables, IPFW, netsh). PREFACE This thesis is written as a part of my master degree in Computer Science at the University of Oslo, Department of Informatics. The thesis is written at the Norwegian Defence Research Establishment (FFI). Scripting has been one of my favourite activities since I first learned it. Combined with the art of Computer Security, which I find fascinating and non-exhaustive, it had to be an explosive combina- tion. My problem next was to find someone to supervise me. This is where Professor Hans Petter Langtangen at Simula Research Laboratory and Geir Hallingstad, researcher at FFI, stepped in. Hans Petter Langtangen is a masterful scripting guru and truly deserves the title “Hacker”. Geir Hallingstad is expert in the field of computer/network security and gave valuable input and support when designing this prototype.
    [Show full text]
  • DISTRIBUTED FIREWALL: a WAY of DATA SECURITY in LOCAL AREA NETWORK Satinder1, Vinay2 1Assistant Professor (Extn.), Department of Computer Science, Govt
    International Journal of Advance Research In Science And Engineering http://www.ijarse.com IJARSE, Vol. No.4, Special Issue (01), April 2015 ISSN-2319-8354(E) DISTRIBUTED FIREWALL: A WAY OF DATA SECURITY IN LOCAL AREA NETWORK Satinder1, Vinay2 1Assistant Professor (Extn.), Department of Computer Science, Govt. College For Women, Hisar, Haryana, INDIA 2Computer Programmer, Computer Section, College of Basic Sciences & Humanities, CCS HAU, Hisar, Haryana, INDIA ABSTRACT Today, Computer and Internet network are essential part of our life. A number of personal transaction occur every second and computer network are mostly used only for transmission of information rather than processing. So, network security is essentialfor avert hacking of our confidential or important information. Network security can be attained by firewall. Firewall is a system or a group of system that implement a set of security rules to apply access control between two networks to protect inside network from outside network. In Short, we can say that, Firewall is a set of software programming and hardware device to secure host computer. A firewall is typically placed at the extremity of a system and act as filter for an illegitimate traffic. But, Conventional firewalls trust on the notions of restricted topology restriction and controlled entry points to apply traffic filtering.There are some problems for restricting the network topology i.e. End-to-End encryption problems, filtering of some protocols.Distributed firewallprotect from hackers attacks that originate from both the Internet and the internal network.Italso protect the client'scomputer and network's serversfrom unwanted hackers and intrusion.In this paper, we introduce the concept of distributed firewall.
    [Show full text]
  • Data Security Based on Lan Using Distributed Firewall
    Jayshri V.Gaud et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.3, March- 2014, pg. 386-391 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 3, Issue. 3, March 2014, pg.386 – 391 RESEARCH ARTICLE DATA SECURITY BASED ON LAN USING DISTRIBUTED FIREWALL Jayshri V.Gaud1, Mahip M.Bartere2 ¹Department of Computer Science & Amravati University, India ²Department of Computer Science & Amravati University, India 1 [email protected]; 2 [email protected] Abstract— Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. In most of the systems, the network security is achieved by firewall and acts as a filter for unauthorized traffic. But there are some problems with these traditional firewalls like they rely on the notation of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, end-to-end encryption problem and few more problems lead to the evolution of Distributed Firewalls. It secures the network by protecting critical network endpoints, exactly where hackers want to penetrate. This paper is a survey paper, dealing with the general concepts such distributed firewalls, its requirements and implications and introduce, its suitability to common threats on the Internet, as well as give a short discussion on contemporary implementations. A distributed firewall gives complete security to the network.
    [Show full text]
  • DATA SECURITY in LAN USING DISTRIBUTED FIREWALL Dr.T.Pandikumar1, Mekonnen Gidey2
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072 DATA SECURITY IN LAN USING DISTRIBUTED FIREWALL Dr.T.Pandikumar1, Mekonnen Gidey2 1Associate Professor, Department of Computer & IT, Defence University, Ethiopia 2M.Tech, Department of Computer & IT, Defence University, Ethiopia ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Computers and Networking have become outside world through wide area networks and the inseparable by now. A number of confidential transactions internet. occur every second and today computers are used mostly Traditional firewalls ( Conventional firewalls ) are for transmission rather than processing of data. So devices often placed on the edge of the network that act Network Security is needed to prevent hacking of data and as a bouncer allowing only certain types of traffic in and to provide authenticated data transfer. Distributed out of the network which often called perimeter firewalls secure the network by protecting critical firewalls. They divide the network into two parts; network endpoints, exactly where hackers want to trusted on one side and un-trusted on the other side. penetrate. It filters traffic from both the Internet and the For this reason they depend heavily on the topology of internal network because the most destructive and costly the network. Moreover, firewalls are a mechanism for hacking attacks still originate from within the policy control and permit a site administrator to set a organization. They provide virtually unlimited scalability. policy on external access. Just as file permissions In addition, they overcome the single point-of-failure enforces an internal security policy and can enforces an problem presented by the perimeter firewall.
    [Show full text]
  • Providing Security and Privacy in Cloud Computing Using Distributed Firewall and VPN
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611 Providing Security and Privacy in Cloud Computing Using Distributed Firewall and VPN Dr. Chinthagunta Mukundha1, Dr. I. Surya Prabha2 1Associate Professor, IT Department, Sreenidhi Institute of Science and Technology, Hyd -500043, Andhra Pradesh, India 2Professor, IT Department, Institute of Aeronautical Engineering, Hyd -500043, Andhra Pradesh, India Abstract: Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator has been conducted for the cases of cloud computing with and without VPN and firewall. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies it also inherits their security issues cloud involves defined interaction with SLA based policies for the resource and service usages. If someone violates these rules the protection level of system gets compromised. Traditional security of the system is handled by the firewall. They are made for a static and fixed environment having limited policies and interactions. But in cloud environments the scenarios are changed totally and hence the behavior of firewall might also get adaptive as per the need of cloud computing.
    [Show full text]
  • Distributed Perimeter Firewall Policy Management Framework
    DISTRIBUTED PERIMETER FIREWALL POLICY MANAGEMENT FRAMEWORK A DISSERTATION IN Computer Science and Telecommunications and Computer Networking Presented to the Faculty of the University of Missouri-Kansas City in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY by MAHESH NATH MADDUMALA M.Tech., Andhra University, India, 2007 B.Tech., M.L.Engineering College, India, 2004 Kansas City, Missouri 2017 © 2017 MAHESH NATH MADDUMALA ALL RIGHTS RESERVED DISTRIBUTED PERIMETER FIREWALL POLICY MANAGEMENT FRAMEWORK Mahesh Nath Maddumala, Candidate for the Doctor of Philosophy Degree University of Missouri-Kansas City, 2017 ABSTRACT A perimeter firewall is the first line of defense that stops unwanted packets (based on defined firewall policies) entering the organization that deploys it. In the real world, every organization maintains a perimeter firewall between internet (which could be untrusted) and its own network (private network). In addition, organizations maintain internal firewalls to safeguard individual departments and data center servers based on various security and privacy requirements. In general, if we consider firewall setup in multinational organization's network environment, every branch has perimeter firewall and a set of internal firewalls. Every branch has its own security policies defined based on its specific security requirements, type of information, information processing systems, location-based compliance requirements, etc. As the branches of the multinational organizations span across the globe, managing the policies at every branch and ensuring the compliance and consistency of security policies are quite complex. Any misconfiguration of firewall policies even at a single branch may pose risk to the overall organization in terms of financial loss and reputation.
    [Show full text]
  • A Stateful CSG-Based Distributed Firewall Architecture for Robust Distributed Security
    A Stateful CSG-based Distributed Firewall Architecture for Robust Distributed Security V. Ramsurrun, and K. M. S. Soyjaudah Electrical & Electronic Engineering Department University of Mauritius (UoM) Réduit, Mauritius [email protected], [email protected] Abstract —Distributed firewalls have been developed in order to is provided at the very cluster level, the whole of the network provide networks with a higher level of protection than will become more secure as we can reduce the occurrence of traditional firewalling mechanisms like gateway and host-based both insider & external attacks, and limit their spread & effects firewalls. Although distributed firewalls provide higher security, more readily. A 2-active-node stateful CSG is used for they too have limitations. This work presents the design & protecting each end-user cluster in our working prototype. implementation of a new distributed firewall model, based on In this paper, we perform the following: stateful Cluster Security Gateway (CSG) architecture, which addresses those shortcomings. This distributed security model 1. Review of the strengths & limitations of distributed adopts a bottom-up approach such that each cluster of end-user firewalls. hosts is first secured using the CSG architecture. These different 2. Use of the stateful CSG to implement a new robust CSGs are then centrally managed by the Network Administrator. distributed firewall model. A file-based firewall update mechanism is used for dynamic real- time security. IPsec is used to secure the firewall policy update 3. Qualitative comparison of its strengths & weaknesses distribution while X.509 certificates cater for sender/receiver with other major software-based & hardware-based authentication. The major benefits of this approach to distributed distributed firewall architectures available.
    [Show full text]
  • Network Firewalls (Pdf)
    Network Firewalls Kenneth Ingham Stephanie Forrest [email protected] [email protected] University of New Mexico University of New Mexico Santa Fe Institute Department of Computer Science Department of Computer Science 1399 Hyde Park Road MSC01 1130 MSC01 1130 Santa Fe, NM 87501 1 University of New Mexico 1 University of New Mexico Albuquerque, NM 87131-0001 Albuquerque, NM 87131-0001 Contents 1 Introduction 3 2 The Need for Firewalls 7 3 Firewall architectures 9 3.1 Packet filtering . 10 3.1.1 Packet Filtering with State . 11 3.1.2 Improving Packet Filter Specification . 12 3.2 Proxies . 15 4 Firewalls at various ISO network levels 17 4.1 Physical layer . 17 4.2 Data link layer . 18 4.2.1 Filtering on MAC address . 18 4.2.2 Bridging firewalls . 19 4.3 Network . 19 1 4.4 Network- and host-based filtering . 20 4.4.1 Multicast . 20 4.4.2 Network Address Translation . 22 4.5 Transport . 23 4.6 Presentation . 23 4.7 Application . 24 5 Other approaches 24 5.1 Distributed Firewalls . 25 5.2 Dynamic firewalls . 26 5.3 Normalization . 26 5.4 Signature-based Firewalls . 27 5.5 Transient Addressing . 27 6 Firewall Testing 28 7 What firewalls do not protect against 29 7.1 Data Which Passes Through the Firewall . 29 7.2 Servers on the DMZ . 31 7.3 Insider Attacks . 31 8 Future Challenges for Firewalls 32 8.1 VPNs . 32 8.2 Peer-to-peer Networking . 32 8.3 HTTP as a “universal transport protocol” . 33 9 Conclusion 33 2 Abstract Firewalls are network devices that enforce an organization’s security policy.
    [Show full text]
  • Secure Virtual Network Configuration for Virtual Machine (VM) Protection
    NIST Special Publication 800-125B Secure Virtual Network Configuration for Virtual Machine (VM) Protection Ramaswamy Chandramouli This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-125B C O M P U T E R S E C U R I T Y NIST Special Publication 800-125B Secure Virtual Network Configuration for Virtual Machine (VM) Protection Ramaswamy Chandramouli Computer Security Division Information Technology Laboratory This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-125B March 2016 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3541 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official.
    [Show full text]
  • Security and Compliance Configuration for Vmware Cloud Foundation
    Security and Compliance Configuration for VMware Cloud Foundation Modified on 11 MAY 2021 VMware Cloud Foundation 4.2 Security and Compliance Configuration for VMware Cloud Foundation You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2021 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents About Security and Compliance Configuration for VMware Cloud Foundation 4 1 Software Requirements 6 2 Securing ESXi Hosts 8 Security Best Practices for Securing ESXi Hosts 8 Configure Multiple Security Settings on the ESXi Hosts by Using PowerCLI 9 Configure Multiple Security Settings on the ESXi Hosts by Using an SSH Client 11 Enable Normal Lockdown Mode on the ESXi Hosts 12 3 Securing vCenter Server 14 Security Best Practices for Securing vCenter Server 14 Configure Security Settings for vCenter Server from the vSphere Client 15 Configure Security Settings for vCenter Server by Using PowerCLI 19 Configure Security Settings for vCenter Server by Using an SSH Client 19 Configure Security Settings on the vCenter Server Appliance 20 4 Securing SDDC Manager 22 5 Securing Management Virtual Machines 24 6 Securing vSAN 27 Security Best practices for Securing vSAN 27 Configure a Proxy Server for vSAN from the vSphere Client 27 Configure vSAN Data-At-Rest Encryption from the vSphere Client 28 7 Securing NSX-T Data Center 29 Security Best Practices for Securing NSX-T Data Center 29 Configure Security Settings for NSX-T Data Center from User Interfaces 35 Configure Security Settings for NSX-T Data Center by Using CLI Commands 36 8 Security Configurations Not Applicable or Not Compatible with VMware Cloud Foundation 38 VMware, Inc.
    [Show full text]
  • 7-Bit ASCII Code
    Appendix A 7-bit ASCII code 000 001 010 011 100 101 110 111 0000 nul soh stx etx eat enq ack bel 0001 bs ht nl vt np cr so si 0010 dIe del de2 dc3 dc4 nak syn etb VVll can em SUD esc LS gs rs us , 0100 space ! " # $ % & 0101 () * + , - / 0110 0 1 2 3 4 5 6 7 0111 8 9 : ; < = > ? 1000 @ A B C 0 E F G 1001 HI J KLM N 0 1010 P Q R S T U V W A - 1011 XYZ [ \ ] , -- 1100 a b c d e f g 1101 h i j k 1 ill n 0 1110 P q r s t u v w -- 1111 x y z { I ) del Row numbers represent the 4-bit prefix, and the column numbers represent the 3-bit suf­ fix. The first 32 ASCII codes and the last ASCII code are control codes, whIch are not displayable. Appendix B SMA-512 Constants (in hexadecimal) i Ki i Ki i Ki 0 428a2f98d728ae22 1 7137449123ef65cd 2 b5cOfbcfec4d3b2f ':l ,~Q1 o o--u-a-, A -v rv c v- _0C r-'~Qh~-'Q r:; ~Qf'11 f'1hhn~r1n1Q 6 923f82a4afl94f9b 7 ablc5ed5da6d8118 8 d807aa98a3030242 9 12835b0145706fbe 10 243185be4ee4b28c 11 550c7dc3d5ffb4e2 12 72be5d74f27b896f 13 80deblfe3b1696bl 14 9bdc06a725c71235 15 c19bfl74cf692694 16 e49b69c1gef14ad2 17 efbe4786384f25e3 18 Ofc19dc68b8cd5b5 19 240calcc77ac9c65 20 2de92c6f592b0275 21 4a7484aa6ea6e483 22 5cbOa9dcbd41fbd4 23 76f988da831153b5 24 983e5152ee66dfab 25 a831c66d2db43210 26 b00327c898fb213f 27 bf597fc7beefOee4 28 c6eOObf33da88fc2 29 d5a7914793 Oaa 725 30 06ca6351e003826f 31 142929670aOe6e70 32 27b70a8546d22ffc 33 2elb21385c26c926 34 4d2c6dfc5ac42aed 35 53380d139d95b3df 36 650a73548baf63de 37 766aOabb3c77b2a8 38 81c2c92e47edaee6 39 92 722c851482353b 40 a2bfe8a14cfl 0364 41 a81a664bbc423001 42 c24b8b70dOf89791
    [Show full text]
  • Data Security in Local Network Using Distributed Firewall
    DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL A SEMINAR REPORT Submitted by ANAND KUMAR in partial fulfillment of requirement of the Degree of Bachelor of Technology (B.Tech) IN COMPUTER SCIENCE AND ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY KOCHI- 682022 AUGUST 2008 DIVISION OF COMPUTER SCIENCE AND ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY KOCHI-682022 Certificat e Certified that this is a bonafide record of the seminar entitled “DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL ” presented by the following student ANAND KUMAR of the VII semester, Computer Science and Engineering in the year 2008 in partial fulfillment of the requirements in the award of Degree of Bachelor of Technology in Computer Science and Engineering of Cochin University of Science and Technology. Ms. Latha R. Nair. Dr. David Peter S. Seminar Guide Head of Division Date : Acknowledgement Many people have contributed to the success of this. Although a single sentence hardly suffices, I would like to thank Almighty God for blessing us with His grace. I extend my sincere and heart felt thanks to Dr. David Peter, Head of Department, Computer Science and Engineering, for providing us the right ambience for carrying out this work. I am profoundly indebted to my seminar guide, Ms. Latha R. Nair for innumerable acts of timely advice, encouragement and I sincerely express my gratitude to her. I express my immense pleasure and thankfulness to all the teachers and staff of the Department of Computer Science and Engineering, CUSAT for their cooperation and support. Last but not the least, I thank all others, and especially my classmates who in one way or another helped me in the successful completion of this work.
    [Show full text]