Security and Performance Enhancement of Network by Integration of Firewall Mechanism with Advanced Encryption System
Keywords:
Firewall, Encryption, Decryption, Security, PerformanceAbstract
Due to growing demoing of networking there remains need of data security. There are different type of threat to data that is travelling over network. Different researcher have proposed firewall mechanism to filter the un authentic transmission while some researcher focused on data encryption to convert plain text in cipher text. Encryption makes the data secure from being understood by unauthentic user but it does not provide security to data at the time of denial of services or packet dropping. However firewall protects data in such cases but integration of firewall and encryption reduces the system performance. Thus there is need to focus of research where performance should be enhanced while integration of encryption and firewall.
References
- Wojciech Konikiewicz & Marcin Markowski (2017), Analysis of Performance and Efficiency of Hardware and Software Firewalls, Vol. 9, No. 1, pp. 49
- Richa Sharma & Chandresh Parekh (2017), A Study and Its Classification, Volume 8, No. 4, May – June 2017
- Miss. Shwetambari G. Pundkar & Prof. Dr. G. R. Bamnote (2014), Analysis of firewall technology in computer network technology in computer network security, Vol.3 Issue.4, April- 2014, pg. 841-846
- Steven Thomason (2012), Improving Network Security: Next Generation Firewalls and Advanced Packet Inspection Devices, Volume 12 Issue 13 Version 1.0 Year 2012
- RahatAfreen, S.C. Mehrotra, (2011). A Review on Elliptic Curve Cryptography for Embedded Systems. International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011, Pp 84-103.
- M.Georgescu and M.Matei 2013, the value of cloud computing in business environment, The USV Annals of Economics and Public Administration, vol.13, no.1, pp. 222--228, 2013.
- P.Pazowski and Z.Pastuszak 2013, Cloud computing – a case study for new ideal of IS/IT implementation, in International Conference on Management, Knowledge and Learning, Zadar, Croatia, 2013, pp. 855--862.
- B.H. Bhavani and H.S. Guruprasad 2014, Resource provisioning techniques in cloud computing environment: A survey, International Journal of Research in Computer and Communication Technology, vol.3, no.3, pp. 395--401, 2014.
- J. Skrinarova, M. Povinsky 2015, Comparative Study of Simulators for Cloud Computing, IEEE, PP.1-8, 2015.
- I. Kashefi, Maryam Kassiri, Ali Shahidinejad (2013). A Survey on Security Issues in Firewalls: A New Approach for Classifying Firewall Vulnerabilities.
- Damodharan, Prabhat Kumar Srivastava (2018). A Review Paper on Computer Firewall. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 5, Issue 2, February 2018
- Dr. Ajit Singh, Madhu Pahal, Neeraj Goyat (2013), A Review Paper On Firewall, Vol. 1 Issue II, September 2013
- Bavithra.G.R, Mahalakshmi.V, R.Suganya (2018), A Review on Firewall and its Attacks, Vol. 7, Issue 1, January 2018
- Raed Alsaqour, 1 Ahmed Motmi, 2*Maha Abdelhaq (2021). A Systematic Study of Network Firewall and Its Implementation. IJCSNS International Journal of Computer Science and Network Security, VOL.21 No.4, April 2021
- Roumaissa Khelf; Nacira Ghoualmi-Zine (2018). IPSec/Firewall Security Policy Analysis: A Survey. DOI: 10.1109/SIVA.2018.8660973
- Roza Dastres, Mohsen Soori (2021). A Review in Recent Development of Network Threats and Security Measures. International Journal of Computer and Information Engineering Vol:15, No:1, 2021.
- Xinzhou He (2021). Research on Computer Network Security Based on Firewall Technology. doi:10.1088/1742-6596/1744/4/042037
- M. G. Mihalos1,*, S. I. Nalmpantis2 and K. Ovaliadis2 (2019). Design and Implementation of Firewall Security Policies using Linux Iptables. Journal of Engineering Science and Technology Review 12 (1) (2019) 80 – 86.
- Yuchong Lia, Qinghui Liu (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. https://doi.org/10.1016/j.egyr.2021.08.126.
- Raja Waseem Anwar 1,*ORCID,Tariq Abdullah 2 andFlavio Pastore (2021). Firewall Best Practices for Securing Smart Healthcare Environment: A Review. Appl. Sci. 2021, 11(19), 9183; https://doi.org/10.3390/app11199183
- Khaled Salah, Khalid Elbadawi, Raouf Boutaba (2012), Performance Modelling and Analysis of Network Firewalls, Volume: 9 , Issue: 1 , March 2012
- Mohammad Imran, Dr.AbdulrahmanA.Algamdi, Bilal Ahmad (2015), Role of firewall Technology in Network Security, Volume 4, Issue 12 December 2015
- Er. Shikha Pandit, Er. Pritam Kumar, Er. Deepak Malik (2014), Fire-Router: A new secure inter-networking device, Vol. 3, Issue. 6, June 2014, pg.279 – 285
- S.C. Tharaka, R.L.C. Silva, S. Sharmila, S.U.I. Silva, K.L.D.N. Liyanage, A.A.T.K.K. Amarasinghe, D.Dhammearatchi (2016), High Security Firewall: Prevent Unauthorized Access Using Firewall Technologies, Volume 6, Issue 4, April 2016
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.