Novel Application to Managing Windows Embedded Firewall Programmatically in Network Security
International Journal of Sensors and Sensor Networks
Volume 5, Issue 5-1, September 2017, Pages: 18-24
Received: Mar. 24, 2017; Accepted: Mar. 25, 2017; Published: Jun. 9, 2017
Views 1418      Downloads 229
Authors
Salah-ddine Krit, Professor of Informatics–Physics at Polydisciplinary Faculty of Ouarzazate, Department Mathematics and Informatics and Management, Laboratory of Engineering Sciences and Energy, Ibn Zohr University, Agadir, Morocco
Elbachir Haimoud, Department Mathematics and Informatics and Management, Polydisciplinary Faculty of Ouarzazate, Ouarzazate, Morocco
Article Tools
Follow on us
Abstract
Due to the increasing threat of network attacks, Firewall has become crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is to examine each packet that passes through it and decide whether to letting them pass or halting them based on preconfigured rules and policies, so firewall now is the first defense line against cyber attacks. However most of people doesn't know how firewall works, and the most users of windows operating system doesn't know how to use the windows embedded firewall. This paper explains how firewall works, firewalls types, and all you need to know about firewall policies, then presents a novel application (Quds Wall) developed by authors that manages windows embedded firewall and make it easy to use.
Keywords
Firewall, Packet, Packets Filtering, Firewall Policies, Firewall Rules, Windows Embedded Firewall, Computer Security, Network, Firewall Exception, Open Port, Authorize Application
To cite this article
Salah-ddine Krit, Elbachir Haimoud, Novel Application to Managing Windows Embedded Firewall Programmatically in Network Security, International Journal of Sensors and Sensor Networks. Special Issue:Smart Cities Using a Wireless Sensor Networks. Vol. 5, No. 5-1, 2017, pp. 18-24. doi: 10.11648/j.ijssn.s.2017050501.14
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Brian Komar, Ronald Beekelaar, Joern Wettern "Firewalls for Dummies", p 10, August 2001
[2]
S. Cobb "Establishing firewall policy", Published in: Southcon/96. Conference Record, June 1996
[3]
Figure is property of https://www.axiatp.com/managed-firewall
[4]
Guido van Rooij "Real Stateful TCP Packet Filtering in IP Filter", pp 1-2
[5]
B. Gambrel, "Networking Fundamentals", published by Wiley, p173 2011
[6]
Habtamu Abie "An Overview of Firewall Technologies", p 3, January 2000
[7]
Er. Smriti Salaria, Er. Nishi Madaan "Firewall and Its Policies Management", IJCSMC, Vol. 3, Issue. 4, p 366, April 2014
[8]
Y. BARTAL, A. MAYER, K. NISSIM, A. WOOL "Firmato: A Novel Firewall Management Toolkit", 20th IEEE Symposiumon Security and Privacy, Oakland, p 2, May 1999
[9]
Internet Assigned Numbers Authority, http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
[10]
Salah-Ddine Krit, ElBachir Haimoud “Review On The IT Security: Attack And Defense” International Conference on Engineering & Mis 2016 (ICEMIS2016 submission 74), 22-24 September, Agadir 2016, Morocco.
ADDRESS
Science Publishing Group
548 FASHION AVENUE
NEW YORK, NY 10018
U.S.A.
Tel: (001)347-688-8931