Study of User Behaviour for Firewall Configuration

Authors(3) :-N. Chiranjeeva Rao, Shankha De, Chaitali Choudhary

Configuration of firewalls is a task which every System Administrator need to perform from time to time. Every firewall comes with its own set of default rules which need to be updated from time to time. A thorough analysis of the user behavior in an organization or institution would help the Administrator to understand the needs of the organization in a much better manner. This paper aims at understanding the user behavior of a particular network over a period of time and accordingly redefine the rules. This upgradation of rules helps in efficient utilization of resources in the organization. This also ensures even distribution of resources of organization giving equal usage opportunities to all users.

Authors and Affiliations

N. Chiranjeeva Rao
Department of Computer Science Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India
Shankha De
Department of Computer Science Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India
Chaitali Choudhary
Department of Computer Science Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India

Firewall efficiency, User behavior in Networks, Firewall configuration

  1. Dr. Ajit Singh, Madhu Pahal &  Neeraj Goyat, “A Review Paper on firewall”, International Journal for Research in Applied Science & Engineering Technology, Vol. I, Issue II (September 2013)
  2. Sachi Pandey , Vibhore Tyagi, “Performance Analysis of Wired & Wireless Network using NS2 simulator”, International Journal of Computer Applications, Vol. 72, No. 21 (June 2013)
  3. Mr. Sachin Taluja, Mr. Pradeep Kumar Verma, Prof. Rajeshwar Dua, “Network Security Using IP firewalls”, International Journal of Advanced Research in Computer Science & Software Engineering, Vol. II, Issue 8 (August 2012)
  4. Safaa Zeidan1, Zouheir Trabelsi2, “A Survey on Firewall’s Early Packet Rejection Techniques”, International Conference on Innovations in Information Technology (2011)
  5. Andrew Lockhart, “Network Security Hacks”, O'Reilly Media (2004)
  6. William Stallings, “Network Security Essentials”, Pearson Education (2011)

Publication Details

Published in : Volume 2 | Issue 3 | May-June 2017
Date of Publication : 2017-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 387-389
Manuscript Number : CSEIT172373
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

N. Chiranjeeva Rao, Shankha De, Chaitali Choudhary, "Study of User Behaviour for Firewall Configuration", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.387-389, May-June-2017.
Journal URL : http://ijsrcseit.com/CSEIT172373

Article Preview

Follow Us

Contact Us