International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 4 - Issue 1 |
Published: July 2010 |
Authors: Dr. S. Arumugam, P. Senthilkumar |
![]() |
Dr. S. Arumugam, P. Senthilkumar . Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database. International Journal of Computer Applications. 4, 1 (July 2010), 37-41. DOI=10.5120/793-1126
@article{ 10.5120/793-1126, author = { Dr. S. Arumugam,P. Senthilkumar }, title = { Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database }, journal = { International Journal of Computer Applications }, year = { 2010 }, volume = { 4 }, number = { 1 }, pages = { 37-41 }, doi = { 10.5120/793-1126 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2010 %A Dr. S. Arumugam %A P. Senthilkumar %T Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database%T %J International Journal of Computer Applications %V 4 %N 1 %P 37-41 %R 10.5120/793-1126 %I Foundation of Computer Science (FCS), NY, USA
The society has grown to rely on internet services, and the number of internet client increases every day. As more users are connected to the network, millions a user to do their damage becomes very great and lucrative. In conventional firewall rely on topology restrictions and controlled network entry points to enforce packet filtering. In this paper, I propose method of multiple firewall concepts and also maintain the database for both the authorized and unauthorized entry details based on security policy to enforce the static and dynamic packet filtering. This technique is implemented in software tool called distributed firewall policy advisor and specialized database (SDB).