Firewall Redundancy Rules Filtering Using Integrity Rules Checking
Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and f...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
American Scientific Publisher
2018
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf http://umpir.ump.edu.my/id/eprint/19617/ https://doi.org/10.1166/asl.2018.12957 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Pahang |
Language: | English |
id |
my.ump.umpir.19617 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.196172018-11-12T08:52:47Z http://umpir.ump.edu.my/id/eprint/19617/ Firewall Redundancy Rules Filtering Using Integrity Rules Checking Zarina, Dzolkhifli Wan Nurul Safawati, Wan Manan Mohd Hafiz, Mohd Hassin Dhia Syafiqa, Mohd Jaafar QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and from the network, while making a decision whether to give permission or deny the packet based on its rules policy requirements. Commonly, there will be a large of firewall rules set are stored inside the firewall which each packet need to be compared sequentially with filtering until matching rules is found. A new strategy of integrity rules checking is proposed to reduce a firewall rules by analyzing the integrity among the firewall rules relationship to be checked for incoming packet. We believe that the proposed strategy will minimize the firewall rules set and undoubtedly optimize the time of firewall rules filtering. American Scientific Publisher 2018-11 Article PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf Zarina, Dzolkhifli and Wan Nurul Safawati, Wan Manan and Mohd Hafiz, Mohd Hassin and Dhia Syafiqa, Mohd Jaafar (2018) Firewall Redundancy Rules Filtering Using Integrity Rules Checking. Advanced Science Letters, 24 (10). pp. 7451-7454. ISSN 1936-6612 https://doi.org/10.1166/asl.2018.12957 DOI: 10.1166/asl.2018.12957 |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering Zarina, Dzolkhifli Wan Nurul Safawati, Wan Manan Mohd Hafiz, Mohd Hassin Dhia Syafiqa, Mohd Jaafar Firewall Redundancy Rules Filtering Using Integrity Rules Checking |
description |
Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and from the network, while making a decision whether to give permission or deny the packet based on its rules policy requirements. Commonly, there will be a large of firewall rules set are stored inside the firewall which each packet need to be compared sequentially with filtering until matching rules is found. A new strategy of integrity rules checking is proposed to reduce a firewall rules by analyzing the integrity among the firewall rules relationship to be checked for incoming packet. We believe that the proposed strategy will minimize the firewall rules set and undoubtedly optimize the time of firewall rules filtering. |
format |
Article |
author |
Zarina, Dzolkhifli Wan Nurul Safawati, Wan Manan Mohd Hafiz, Mohd Hassin Dhia Syafiqa, Mohd Jaafar |
author_facet |
Zarina, Dzolkhifli Wan Nurul Safawati, Wan Manan Mohd Hafiz, Mohd Hassin Dhia Syafiqa, Mohd Jaafar |
author_sort |
Zarina, Dzolkhifli |
title |
Firewall Redundancy Rules Filtering Using Integrity Rules Checking |
title_short |
Firewall Redundancy Rules Filtering Using Integrity Rules Checking |
title_full |
Firewall Redundancy Rules Filtering Using Integrity Rules Checking |
title_fullStr |
Firewall Redundancy Rules Filtering Using Integrity Rules Checking |
title_full_unstemmed |
Firewall Redundancy Rules Filtering Using Integrity Rules Checking |
title_sort |
firewall redundancy rules filtering using integrity rules checking |
publisher |
American Scientific Publisher |
publishDate |
2018 |
url |
http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf http://umpir.ump.edu.my/id/eprint/19617/ https://doi.org/10.1166/asl.2018.12957 |
_version_ |
1643668693987622912 |