• May 03, 2016 News! IJIET Vol. 5, No. 10 has been indexed by EI (Inspec).   [Click]
  • Mar 13, 2017 News!Vol. 7, No. 5 has been indexed by Crossref.
  • Mar 10, 2017 News!Vol. 7, No. 5 issue has been published online!   [Click]
General Information
    • ISSN: 2010-3689
    • Frequency: Bimonthly (2011-2014); Monthly (Since 2015)
    • DOI: 10.18178/IJIET
    • Editor-in-Chief: Prof. Dr. Steve Thatcher
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: EI (INSPEC, IET), Electronic Journals Library, Google Scholar, Crossref and ProQuest
    • E-mail: ijiet@ejournal.net
Editor-in-chief
Prof. Dr. Steve Thatcher
University of South Australia, Australia
It is my honor to be the editor-in-chief of IJIET. The journal publishes good papers which focous on the advanced researches in the field of information and education technology. Hopefully, IJIET will become a recognized journal among the scholars in the filed of information and education technology.
IJIET 2015 Vol.5(12): 951-956 ISSN: 2010-3689
DOI: 10.7763/IJIET.2015.V5.644

Expert Rules of Firewall: A Technique to Construct and Modified a Set of Rules

Koh May Fern and Sharipah Setapa
Abstract—Firewall always changing based on organizational policy and will make a respective person in charge of firewall take a long time to amend and verify the rule. The rule is applied to the firewall based on specific parameter. There can be many ways to create an order of rules, but it will be difficult and confusing to other person which will have to maintain it. One of the techniques is to utilize specific parameter as a main relationship which is traceable and can be expanded with specific pattern. If the parameter can be combined based on certain condition and this condition can incorporate in knowledge based as a library for a set relationship, which at the end can create a sequence of flow. This relationship will be recalled if the same condition happens again. In the knowledge based it also will contain a prediction based on common traffic which being used frequently. This concept will help and make easier to manipulate and monitor the rule correctly for multiple different location but using similar rules. It can be expanded to compliment other queries which using existing database firewall to check the queries before be permitted to access MySql database. In addition, the relationship also covers risk alert if the combination of low-risk port with medium-risk port creating a high-risk case.

Index Terms—Rules, knowledge based, simplify, relationship.

Koh May Fern is with TPM Development Operation Department, MIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur, Malaysia (e-mail: koh.mf@mimos.my).
Sharipah Setapa is with Advanced Computing Lab Department, MIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur, Malaysia (e-mail: sharipah@mimos.my).

[PDF]

Cite: Koh May Fern and Sharipah Setapa, "Expert Rules of Firewall: A Technique to Construct and Modified a Set of Rules," International Journal of Information and Education Technology vol. 5, no. 12, pp. 951-956, 2015.

Copyright © 2008-2016. International Journal of Information and Education Technology. All rights reserved.
E-mail: ijiet@ejournal.net