Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
press.pptx
1. B.Sc. Thesis Presentation
Title: Load Balancing Ip Table
By:
Lena Hassan
Nusaiba Abu obaida
Salma salah
Co.Supervisors:
Dr. Muhammad babiker
Dr. Fahmi Al- sadig
3. Agenda Style
Introduction
• Concept of security
• Concept of firewall as one of network technologies that
used to protect information transmit through internet .
• . Concept of high availability and its important role in
providing information.
Introduction
4. Problem:
firewall failures have become a common
occurrence facing organizations that use the
Internet and use firewalls to protect information,
The failure of the wall leads to an interruption of
service and the loss of necessary protection
that the organization needs and fixing the crash
may require a period of time in the meantime,
as there is no alternative to keeping its
information protected. The organization may be
exposed to the act of the hacker resulting in the
loss of important information.
.
5. Agenda Style
Objectives
• Develop model that solve unavailability of services.
• Ensure that the network is not interrupted, case there are cluster
firewalls if one falls the other ensures continuity of service.
• Enhanced protection, using a strong cluster firewall protect
your network from malicious incoming traffic.
• Test the model.
Objectives
6. Related works
Recomme
ndations
Results
Methodol
ogy
Problem+ Objecti
ve
Author + y
ear
developments f
ollow the prese
nt trend, contin
ue to combine c
onfigurable acc
ess control and
authentication
mechanisms wit
h their tradition
al functions.
Helping to provi
ding more powe
rful and flexible
protection for n
etworks to mak
e them secure.
Development ne
w features are c
onstantly being
add to firewall.
solve The increasing comple
xity of networks, and the ne
ed to make them more open
due to the growing emphasi
s on and attractiveness of th
e Internet as a medium for b
usiness transactions.
HABTAMU ABI J
ANUARY 2000
1
Includes extend
ing.
Helping to provi
ding more powe
rful and flexible
protection for n
etworks to mak
e them secure.
Use a user-frien
dly tool called “
Firewall Policy
Advisor.”
management of any generic
firewall policy written as filte
ring rules, while minimizing
network vulnerability due to
firewall rule misconfiguratio
n.
EHAB S. AL-SHA
ER and HAZEM H
. HAMED
2004
2
7. Methodology
Two firewalls inside one cluster links
them together. One is configured as
the master device; the other one is
configured as the backup device and
these firewalls communicate through a
heartbeat to make sure that the master
device is working. If this
communication between the two
firewalls is soaked, the pulses are cut
off, and the firewall in the reserve
sends messages to the master device.
If it does not get a response from it, the
backup device automatically works to
maintain the availability of network
communication.
8. Agenda Style
Reference
Reference
[1] K. Ingham, “A History and Survey of Network Firewalls,” vol. V, pp. 1–42.
[2] K. Scarfone and P. Hoffman, Guidelines on firewalls and firewall policy: recommendations of the National Instit
ute of Standards and Technology, vol. 1. 2015.
[3] E. Etuk, “CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN,” no. April, 2016.
[4] J. Partnerawx, G. Rodriguez, T. Kaur, V. Malhotra, and D. Singh, “Comparison of network security tools-Firewal
l , Intrusion Detection System and Honeypot Comparison of network security tools- Firewall , Intrusion Detection
System and Honeypot”.
[5] Proceedings of International Conference on Technology Management (ICTM 2016), no. Ictm. 2016.
[6] R. Mart, “THE HIGH AVAILABILITY OF STATEFUL FIREWALLS ADVISED BY”.
[7] M. V Pawar and J. Anuradha, “Network Security and Types of Attacks in Network,” Procedia - Procedia Comput
. Sci., vol. 48, no. Iccc, pp. 503–506, 2015, doi: 10.1016/j.procs.2015.04.126.
[8] L. Yuan and H. Chen, “FIREMAN : A Toolkit for Firewall Modeling and ANalysis,” 2006.
[9] H. Abie, “An overview of firewall technologies An Overview of Firewall Technologies”.
[10] H. Hu, S. Member, G. Ahn, and S. Member, “Detecting and Resolving Firewall Policy Anomalies”.
[11] E. Al- shaer, E. S. Al- shaer, and H. H. Hamed, “Modeling and Management of Firewall Policies Modeling and
Management of Firewall Policies”.
[12] A. S. Muntaka, “An Enhanced Integrated High Availability Cluster Model Based on Active- Active and Active-P
assive Cluster,” no. November 2018, 2020, doi: 10.13140/RG.2.2.17449.75360.
[13] B. Author, F. Wennerhult, M. Bj, and H. Bjurgren, “Evaluating high availability in the enterprise network,” 2015
[14] R. D. Oliveira, D. G. Mesquita, and P. F. Rosa, “HARP: A split brain free protocol for high availability implemen
ted in FPGA,” Adv. Int. Conf. Telecommun. AICT, vol. 2013-Janua, no. January, pp. 197–203, 2013.
[15] Y. Feng, N. Huang, S. Member, and Y. Wu, “Evaluation of TCP State Replication Methods for High-Availability
Firewall Clusters,” no. Ii, pp. 2–7, 2008.
[16] J. Ng, P. Soon, S. Hassan, and R. Abdulla, “Implementing of Virtual Router Redundancy Protocol in a Private
University,” vol. 1, no. 4, pp. 255–259, 2013, doi: 10.12720/jiii.1.4.255-259.
[17] P. Rajamohan, “An Overview of Virtual Router Redundancy Protocol Techniques and Implementation for Ente
rprise Networks,” vol. 1, no. 9, pp. 554–562, 2014.
[18] A. I. Aparicio, “A High Availability platform design using Heartbeat and integration in a production environme
nt,” 2008.