Study of User Behaviour for Firewall Configuration
Keywords:
Firewall efficiency, User behavior in Networks, Firewall configurationAbstract
Configuration of firewalls is a task which every System Administrator need to perform from time to time. Every firewall comes with its own set of default rules which need to be updated from time to time. A thorough analysis of the user behavior in an organization or institution would help the Administrator to understand the needs of the organization in a much better manner. This paper aims at understanding the user behavior of a particular network over a period of time and accordingly redefine the rules. This upgradation of rules helps in efficient utilization of resources in the organization. This also ensures even distribution of resources of organization giving equal usage opportunities to all users.
References
- Dr. Ajit Singh, Madhu Pahal & Neeraj Goyat, “A Review Paper on firewall”, International Journal for Research in Applied Science & Engineering Technology, Vol. I, Issue II (September 2013)
- Sachi Pandey , Vibhore Tyagi, “Performance Analysis of Wired & Wireless Network using NS2 simulator”, International Journal of Computer Applications, Vol. 72, No. 21 (June 2013)
- Mr. Sachin Taluja, Mr. Pradeep Kumar Verma, Prof. Rajeshwar Dua, “Network Security Using IP firewalls”, International Journal of Advanced Research in Computer Science & Software Engineering, Vol. II, Issue 8 (August 2012)
- Safaa Zeidan1, Zouheir Trabelsi2, “A Survey on Firewall’s Early Packet Rejection Techniques”, International Conference on Innovations in Information Technology (2011)
- Andrew Lockhart, “Network Security Hacks”, O'Reilly Media (2004)
- William Stallings, “Network Security Essentials”, Pearson Education (2011)
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.