Study of User Behaviour for Firewall Configuration

Authors

  • N. Chiranjeeva Rao  Department of Computer Science Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India
  • Shankha De  Department of Computer Science Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India
  • Chaitali Choudhary  Department of Computer Science Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India

Keywords:

Firewall efficiency, User behavior in Networks, Firewall configuration

Abstract

Configuration of firewalls is a task which every System Administrator need to perform from time to time. Every firewall comes with its own set of default rules which need to be updated from time to time. A thorough analysis of the user behavior in an organization or institution would help the Administrator to understand the needs of the organization in a much better manner. This paper aims at understanding the user behavior of a particular network over a period of time and accordingly redefine the rules. This upgradation of rules helps in efficient utilization of resources in the organization. This also ensures even distribution of resources of organization giving equal usage opportunities to all users.

References

  1. Dr. Ajit Singh, Madhu Pahal &  Neeraj Goyat, “A Review Paper on firewall”, International Journal for Research in Applied Science & Engineering Technology, Vol. I, Issue II (September 2013)
  2. Sachi Pandey , Vibhore Tyagi, “Performance Analysis of Wired & Wireless Network using NS2 simulator”, International Journal of Computer Applications, Vol. 72, No. 21 (June 2013)
  3. Mr. Sachin Taluja, Mr. Pradeep Kumar Verma, Prof. Rajeshwar Dua, “Network Security Using IP firewalls”, International Journal of Advanced Research in Computer Science & Software Engineering, Vol. II, Issue 8 (August 2012)
  4. Safaa Zeidan1, Zouheir Trabelsi2, “A Survey on Firewall’s Early Packet Rejection Techniques”, International Conference on Innovations in Information Technology (2011)
  5. Andrew Lockhart, “Network Security Hacks”, O'Reilly Media (2004)
  6. William Stallings, “Network Security Essentials”, Pearson Education (2011)

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
N. Chiranjeeva Rao, Shankha De, Chaitali Choudhary, " Study of User Behaviour for Firewall Configuration, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.387-389, May-June-2017.