Design and development of an intelligent security layer for web-based applications

Methods to activate firewall mechanism have been introduced in this research. The purpose is to build stronger protection for the intranet from the threats of Internet. The foundation of the work is the threat reduction strategies that are derived from formalizing and identifying the interaction bet...

Full description

Bibliographic Details
Main Authors: Abdullah, Abdul Hanan, Maarof, Mohd. Aizaini, Idris, Mohd. Yazid, Ismail, Abdul Samad, Cahyo Crysdian, Cahyo Crysdian
Format: Monograph
Language:English
Published: Faculty of Computer Science and Information System 2005
Subjects:
Online Access:http://eprints.utm.my/4362/1/74084.pdf
_version_ 1825909542707265536
author Abdullah, Abdul Hanan
Maarof, Mohd. Aizaini
Idris, Mohd. Yazid
Ismail, Abdul Samad
Cahyo Crysdian, Cahyo Crysdian
author_facet Abdullah, Abdul Hanan
Maarof, Mohd. Aizaini
Idris, Mohd. Yazid
Ismail, Abdul Samad
Cahyo Crysdian, Cahyo Crysdian
author_sort Abdullah, Abdul Hanan
collection ePrints
description Methods to activate firewall mechanism have been introduced in this research. The purpose is to build stronger protection for the intranet from the threats of Internet. The foundation of the work is the threat reduction strategies that are derived from formalizing and identifying the interaction between internal users and external parties. Internet access model is developed to facilitate this task. Mechanism of active firewall are divided into two main process i.e. initialisation and runtime process. The former process deals with the mechanism to start up and bring the active firewall into a point of its operation. Three approaches are introduced, namely open condition, close condition and lattice-based method. The open condition and close condition set the firewall into its extreme condition i.e. to open all available communication line or to close all connection respectively, while the lattice-based method affords to bring firewall into its optimum level to protect the intranet by establishing Internet connection based on the predetermined security level. In the runtime process, three methods are introduced as well i.e. adaptively updating security policy using fuzzy reasoning, detecting suspicious process using distributed agent-based module, and zero-based approach to have minimal network services at runtime. Besides analysing each method using its own parameters such as processing time, accuracy and speed for organizing canals, global evaluations were also held to investigate the protection can be delivered to the intranet. In this evaluation, security analysis and comparative study is held, in which each initialisation and runtime process are combined and analysed using three parameters that are created based on RFC 2979 i.e. probability of available network services, probability of exposed line, and denial of services. Results of this study deliver the combination of lattice-based and agent-based module become the best method for activating firewall.
first_indexed 2024-03-05T18:03:44Z
format Monograph
id utm.eprints-4362
institution Universiti Teknologi Malaysia - ePrints
language English
last_indexed 2024-03-05T18:03:44Z
publishDate 2005
publisher Faculty of Computer Science and Information System
record_format dspace
spelling utm.eprints-43622017-08-07T03:18:59Z http://eprints.utm.my/4362/ Design and development of an intelligent security layer for web-based applications Abdullah, Abdul Hanan Maarof, Mohd. Aizaini Idris, Mohd. Yazid Ismail, Abdul Samad Cahyo Crysdian, Cahyo Crysdian ZA4050 Electronic information resources Methods to activate firewall mechanism have been introduced in this research. The purpose is to build stronger protection for the intranet from the threats of Internet. The foundation of the work is the threat reduction strategies that are derived from formalizing and identifying the interaction between internal users and external parties. Internet access model is developed to facilitate this task. Mechanism of active firewall are divided into two main process i.e. initialisation and runtime process. The former process deals with the mechanism to start up and bring the active firewall into a point of its operation. Three approaches are introduced, namely open condition, close condition and lattice-based method. The open condition and close condition set the firewall into its extreme condition i.e. to open all available communication line or to close all connection respectively, while the lattice-based method affords to bring firewall into its optimum level to protect the intranet by establishing Internet connection based on the predetermined security level. In the runtime process, three methods are introduced as well i.e. adaptively updating security policy using fuzzy reasoning, detecting suspicious process using distributed agent-based module, and zero-based approach to have minimal network services at runtime. Besides analysing each method using its own parameters such as processing time, accuracy and speed for organizing canals, global evaluations were also held to investigate the protection can be delivered to the intranet. In this evaluation, security analysis and comparative study is held, in which each initialisation and runtime process are combined and analysed using three parameters that are created based on RFC 2979 i.e. probability of available network services, probability of exposed line, and denial of services. Results of this study deliver the combination of lattice-based and agent-based module become the best method for activating firewall. Faculty of Computer Science and Information System 2005 Monograph NonPeerReviewed application/pdf en http://eprints.utm.my/4362/1/74084.pdf Abdullah, Abdul Hanan and Maarof, Mohd. Aizaini and Idris, Mohd. Yazid and Ismail, Abdul Samad and Cahyo Crysdian, Cahyo Crysdian (2005) Design and development of an intelligent security layer for web-based applications. Project Report. Faculty of Computer Science and Information System, Skudai, Johor. (Unpublished)
spellingShingle ZA4050 Electronic information resources
Abdullah, Abdul Hanan
Maarof, Mohd. Aizaini
Idris, Mohd. Yazid
Ismail, Abdul Samad
Cahyo Crysdian, Cahyo Crysdian
Design and development of an intelligent security layer for web-based applications
title Design and development of an intelligent security layer for web-based applications
title_full Design and development of an intelligent security layer for web-based applications
title_fullStr Design and development of an intelligent security layer for web-based applications
title_full_unstemmed Design and development of an intelligent security layer for web-based applications
title_short Design and development of an intelligent security layer for web-based applications
title_sort design and development of an intelligent security layer for web based applications
topic ZA4050 Electronic information resources
url http://eprints.utm.my/4362/1/74084.pdf
work_keys_str_mv AT abdullahabdulhanan designanddevelopmentofanintelligentsecuritylayerforwebbasedapplications
AT maarofmohdaizaini designanddevelopmentofanintelligentsecuritylayerforwebbasedapplications
AT idrismohdyazid designanddevelopmentofanintelligentsecuritylayerforwebbasedapplications
AT ismailabdulsamad designanddevelopmentofanintelligentsecuritylayerforwebbasedapplications
AT cahyocrysdiancahyocrysdian designanddevelopmentofanintelligentsecuritylayerforwebbasedapplications