IJSTR

International Journal of Scientific & Technology Research

Home Contact Us
ARCHIVES
ISSN 2277-8616











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

IJSTR >> Volume 6 - Issue 3, March 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Impact Of Firewall On Network Performance

[Full Text]

 

AUTHOR(S)

Francis Kwadzo Agbenyegah, Michael Asante

 

KEYWORDS

Firewall, Security, Network Performance, Packets, Opnet

 

ABSTRACT

This research work investigated the firewall security and performance relationship for distributed systems. Internet connectivity is growing with most enterprises migrating to the use of web based services for services provision. As organization grab the Internet as another business tool whether to sell, to team up or to communicate - web applications have turned into the new weakest connection in the organization's security technique. Firewalls provide a mechanism for protecting these enterprises from the less secure internet over which customers or collaborating partners transfer packets destined for the corporate network. The connection between the security and execution proficiency is exhibited through distinctive scenarios and the relationship between security and performance in firewalls is assessed. We demonstrated distinctive networks (with and without firewalls and diverse firewall functionality and simulated such systems with an eye on their performance). The simulation was done for 300 work stations and simulated in a way that all the 300 work stations access an email and web application under three different scenarios. Attention is on the relationship between system security and performance; the impacts of firewalls on system execution. Different scenarios were assessed through simulations utilizing OPNET IT Guru Academic Edition 9.1 to demonstrate the impacts of firewalls on system performance. The result shows that maintaining security which involves the utilization of numerous applications and the use of firewall has an effect on network performance.

 

REFERENCES

[1] Aronson, J. P., Brownlee, Fraser, B.N., and Byrum, F. (1997) “Site security handbook (rfc2196),” [Online] Available: http://www.ietf.org/rfc/rfc2196.txt? Number =2196 [Sep 1997]

[2] Caldwell, D., Gilbert, A., Gottlieb, J., Greenberg, A., Hjalmtysson, G., and Rexford, J. (2003) “The cutting edge of ip router configuration”, in Proceedings of 2nd ACM Workshop on Hot Topics in Networks Hotnets-II.

[3] Corbitt, T. (2002) “Protect your computer system with a security policy,” Management Services, vol. 46(5), pp.20–21,[Online].Available:http://findarticles.Com/p /articles/mi_qa5428 /is_200205/ ai_n21313131/ pg_2? Tag =artBody;col1 [2002.]

[4] Danchev, D., (2003) “Building and implementing a successful information security policy,” [online] Available: http:// www.windowsecurity.com [2003]

[5] Hwang, J. H., Tao X., Chen, F., and Liu, A. X. (2011) “Systematic Structural Testing of Firewall Policies”

[6] Lodin, S. W. and Schuba, C. L. (1998) “Firewalls fend off invasions from the net”, IEEE Spectrum, vol. 35, no. 2, pp. 26–34.

[7] Madigan, E. M., Petrulich, C., and Motuk, K. (2004) “The cost of non-compliance: when policies fail’’ in SIGUCCS 04 in proceeding of the 32nd annual ACM SIGUCCS

[8] Mayer, A., Wool, A., and Ziskind, E. (2006) “Offline firewall analysis”, International Journal of Information Security vol.5 no.3 pp. 125-144

[9] Pesante, L.,(2008) “Introduction to Information Security”

[10] Richard. J. Macfarlane (2009) “An Integrated Firewall Policy Validation Tool”

[11] Rubin, A. D., Geer, D., and Ranum, M. J. (1997) Web Security Sourcebook. Wiley

[12] Samarati, P. and de Vimercati, S. C. (2000) “Access control: Policies, models, and mechanisms”, Lecture Notes in Computer Science, vol.2171, pp.137–196.

[13] Sheth, C., and Thakker, R. (2011) Performance Evaluation and Comparative Analysis of Network Firewalls

[14] Wool, A. (2006) Packet Filtering and Stateful Firewalls Wiley, Firewall Architectures,p.526