• May 14, 2019 News!IJIET Vol. 7, No. 9-Vol. 8, No. 8 have been indexed by EI (Inspec).   [Click]
  • Apr 15, 2019 News![Call for Papers] Special Issue on Education, Research and Innovation   [Click]
  • Jul 17, 2019 News!Vol. 9, No. 8 has been indexed by Crossref.
General Information
    • ISSN: 2010-3689 (Online)
    • Abbreviated Title: Int. J. Inf. Educ. Technol.
    • Frequency: Monthly
    • DOI: 10.18178/IJIET
    • Editor-in-Chief: Prof. Dr. Steve Thatcher
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: Scopus (Since 2019), EI(INSPEC, IET), EBSCO, Electronic Journals Library, Google Scholar, Crossref, etc.
    • E-mail: ijiet@ejournal.net
Prof. Dr. Steve Thatcher
CQUniversity, Australia
It is my honor to be the editor-in-chief of IJIET. The journal publishes good-quality papers which focous on the advanced researches in the field of information and education technology. Hopefully, IJIET will become a recognized journal among the scholars in the related fields.

IJIET 2015 Vol.5(12): 951-956 ISSN: 2010-3689
DOI: 10.7763/IJIET.2015.V5.644

Expert Rules of Firewall: A Technique to Construct and Modified a Set of Rules

Koh May Fern and Sharipah Setapa
Abstract—Firewall always changing based on organizational policy and will make a respective person in charge of firewall take a long time to amend and verify the rule. The rule is applied to the firewall based on specific parameter. There can be many ways to create an order of rules, but it will be difficult and confusing to other person which will have to maintain it. One of the techniques is to utilize specific parameter as a main relationship which is traceable and can be expanded with specific pattern. If the parameter can be combined based on certain condition and this condition can incorporate in knowledge based as a library for a set relationship, which at the end can create a sequence of flow. This relationship will be recalled if the same condition happens again. In the knowledge based it also will contain a prediction based on common traffic which being used frequently. This concept will help and make easier to manipulate and monitor the rule correctly for multiple different location but using similar rules. It can be expanded to compliment other queries which using existing database firewall to check the queries before be permitted to access MySql database. In addition, the relationship also covers risk alert if the combination of low-risk port with medium-risk port creating a high-risk case.

Index Terms—Rules, knowledge based, simplify, relationship.

Koh May Fern is with TPM Development Operation Department, MIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur, Malaysia (e-mail: koh.mf@mimos.my).
Sharipah Setapa is with Advanced Computing Lab Department, MIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur, Malaysia (e-mail: sharipah@mimos.my).


Cite: Koh May Fern and Sharipah Setapa, "Expert Rules of Firewall: A Technique to Construct and Modified a Set of Rules," International Journal of Information and Education Technology vol. 5, no. 12, pp. 951-956, 2015.

Copyright © 2008-2019. International Journal of Information and Education Technology. All rights reserved.
E-mail: ijiet@ejournal.net