Firewall Redundancy Rules Filtering Using Integrity Rules Checking

Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and f...

Full description

Saved in:
Bibliographic Details
Main Authors: Zarina, Dzolkhifli, Wan Nurul Safawati, Wan Manan, Mohd Hafiz, Mohd Hassin, Dhia Syafiqa, Mohd Jaafar
Format: Article
Language:English
Published: American Scientific Publisher 2018
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf
http://umpir.ump.edu.my/id/eprint/19617/
https://doi.org/10.1166/asl.2018.12957
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.19617
record_format eprints
spelling my.ump.umpir.196172018-11-12T08:52:47Z http://umpir.ump.edu.my/id/eprint/19617/ Firewall Redundancy Rules Filtering Using Integrity Rules Checking Zarina, Dzolkhifli Wan Nurul Safawati, Wan Manan Mohd Hafiz, Mohd Hassin Dhia Syafiqa, Mohd Jaafar QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and from the network, while making a decision whether to give permission or deny the packet based on its rules policy requirements. Commonly, there will be a large of firewall rules set are stored inside the firewall which each packet need to be compared sequentially with filtering until matching rules is found. A new strategy of integrity rules checking is proposed to reduce a firewall rules by analyzing the integrity among the firewall rules relationship to be checked for incoming packet. We believe that the proposed strategy will minimize the firewall rules set and undoubtedly optimize the time of firewall rules filtering. American Scientific Publisher 2018-11 Article PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf Zarina, Dzolkhifli and Wan Nurul Safawati, Wan Manan and Mohd Hafiz, Mohd Hassin and Dhia Syafiqa, Mohd Jaafar (2018) Firewall Redundancy Rules Filtering Using Integrity Rules Checking. Advanced Science Letters, 24 (10). pp. 7451-7454. ISSN 1936-6612 https://doi.org/10.1166/asl.2018.12957 DOI: 10.1166/asl.2018.12957
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA76 Computer software
TK Electrical engineering. Electronics Nuclear engineering
spellingShingle QA76 Computer software
TK Electrical engineering. Electronics Nuclear engineering
Zarina, Dzolkhifli
Wan Nurul Safawati, Wan Manan
Mohd Hafiz, Mohd Hassin
Dhia Syafiqa, Mohd Jaafar
Firewall Redundancy Rules Filtering Using Integrity Rules Checking
description Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and from the network, while making a decision whether to give permission or deny the packet based on its rules policy requirements. Commonly, there will be a large of firewall rules set are stored inside the firewall which each packet need to be compared sequentially with filtering until matching rules is found. A new strategy of integrity rules checking is proposed to reduce a firewall rules by analyzing the integrity among the firewall rules relationship to be checked for incoming packet. We believe that the proposed strategy will minimize the firewall rules set and undoubtedly optimize the time of firewall rules filtering.
format Article
author Zarina, Dzolkhifli
Wan Nurul Safawati, Wan Manan
Mohd Hafiz, Mohd Hassin
Dhia Syafiqa, Mohd Jaafar
author_facet Zarina, Dzolkhifli
Wan Nurul Safawati, Wan Manan
Mohd Hafiz, Mohd Hassin
Dhia Syafiqa, Mohd Jaafar
author_sort Zarina, Dzolkhifli
title Firewall Redundancy Rules Filtering Using Integrity Rules Checking
title_short Firewall Redundancy Rules Filtering Using Integrity Rules Checking
title_full Firewall Redundancy Rules Filtering Using Integrity Rules Checking
title_fullStr Firewall Redundancy Rules Filtering Using Integrity Rules Checking
title_full_unstemmed Firewall Redundancy Rules Filtering Using Integrity Rules Checking
title_sort firewall redundancy rules filtering using integrity rules checking
publisher American Scientific Publisher
publishDate 2018
url http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf
http://umpir.ump.edu.my/id/eprint/19617/
https://doi.org/10.1166/asl.2018.12957
_version_ 1643668693987622912
score 13.211869