Different firewall techniques: A survey

Rupam Kumar Sharma, Hemanta Kumar Kalita, Biju Issac

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

23 Citations (Scopus)

Abstract

Firewalls today are an integrated part of security mechanism of any organization or institution. Firewalls throughout the years have evolved merely from static rule mapping to understanding the dynamic behavior of traffic and react accordingly. Different firewall techniques operating in several layers of the TCP/IP model have been proposed by different authors in different times. In this paper an insight into some of the firewall techniques are discussed and also an attempt has been made to portray different challenges that exist in the application traffic.

Original languageEnglish
Title of host publication5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
PublisherIEEE
ISBN (Electronic)9781479926961
DOIs
Publication statusPublished - 20 Nov 2014
Event5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014 - Hefei, China
Duration: 11 Jul 201413 Jul 2014

Conference

Conference5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
Country/TerritoryChina
CityHefei
Period11/07/1413/07/14

Keywords

  • filtering rules
  • Firewalls
  • intrusion
  • virus
  • worms

Fingerprint

Dive into the research topics of 'Different firewall techniques: A survey'. Together they form a unique fingerprint.

Cite this