{"title":"“名气”:监视和解决防火墙异常","authors":"B. Lakshimibhargavi, V. MARUTI PRASAD","doi":"10.47893/ijcns.2014.1098","DOIUrl":null,"url":null,"abstract":"Advent of many emerging computing technologies became very catchy to users. So, usage of technology increasing very rapidly day by day. Security became major issue. People who are working through the internet suffer from unintended security leakages by unauthorised actions in an organization and also problems created by hackers through the malicious codes. To overcome\nthe security issues we have a concept called “firewall” .Network fire alls guard an internal computer network (home, school, business\nintranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. In this paper, we elaborate FAME(firewall anomaly management environment) and we will have a glance on firewall anomalies and resolving techniques. In addition we are going explain few concepts practically and also representing diagrammatically.","PeriodicalId":38851,"journal":{"name":"International Journal of Communication Networks and Information Security","volume":"66 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"“FAME”: FSPYING & SOLVING FIREWALL ANOMALIES\",\"authors\":\"B. Lakshimibhargavi, V. MARUTI PRASAD\",\"doi\":\"10.47893/ijcns.2014.1098\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advent of many emerging computing technologies became very catchy to users. So, usage of technology increasing very rapidly day by day. Security became major issue. People who are working through the internet suffer from unintended security leakages by unauthorised actions in an organization and also problems created by hackers through the malicious codes. To overcome\\nthe security issues we have a concept called “firewall” .Network fire alls guard an internal computer network (home, school, business\\nintranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. In this paper, we elaborate FAME(firewall anomaly management environment) and we will have a glance on firewall anomalies and resolving techniques. In addition we are going explain few concepts practically and also representing diagrammatically.\",\"PeriodicalId\":38851,\"journal\":{\"name\":\"International Journal of Communication Networks and Information Security\",\"volume\":\"66 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Communication Networks and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47893/ijcns.2014.1098\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Networks and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47893/ijcns.2014.1098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
Advent of many emerging computing technologies became very catchy to users. So, usage of technology increasing very rapidly day by day. Security became major issue. People who are working through the internet suffer from unintended security leakages by unauthorised actions in an organization and also problems created by hackers through the malicious codes. To overcome
the security issues we have a concept called “firewall” .Network fire alls guard an internal computer network (home, school, business
intranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. In this paper, we elaborate FAME(firewall anomaly management environment) and we will have a glance on firewall anomalies and resolving techniques. In addition we are going explain few concepts practically and also representing diagrammatically.
期刊介绍:
International Journal of Communication Networks and Information Security (IJCNIS) is a scholarly peer reviewed international scientific journal published three times (April, August, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security.