Call For Papers
Contact Us

  Tuning Firewall Based on Users Usage Statistics  
  Authors : V. Valli Kumari; K.V. Kalyan Chakravarthy
  Cite as:


The number of Internet users worldwide has skyrocketed since the birth of the World Wide Web. Users access different internet websites includes social networking websites, peer to peer or other categories which affects internet bandwidth of the organization. Internet service provider (ISP) will send warning mails forcing administrator to identify the user who is accessing or misusing internet service. Monitoring of network data gives overall network flow in organization. Monitoring can be done within the firewall or redirecting the logs that are received to external server. External log server can be deployed, if organization is large in size as the traffic flowing through the firewall will be more. So internal storage for storing of such huge data canít be done. This paper proposed a new deployment technique which helps the administrator to automate by using predefined policies of the organization user behavior and bandwidth are monitored. To conserve this system automated operation, every step is recorded in log server and evaluated. Tests are developed and analyzed on proposed system resulting in good result.


Published In : IJCSN Journal Volume 6, Issue 4

Date of Publication : August 2017

Pages : 478-482

Figures :03

Tables : 04


V. Valli Kumari : Dept. of Computer Science and Systems Engineering. AU College of Engineering (A) Visakhapatnam Ė 530003, Andhra Pradesh, India.

K.V. Kalyan Chakravarthy : Dept. of Computer Science and Systems Engineering. AU College of Engineering (A) Visakhapatnam Ė 530003, Andhra Pradesh, India.


Logs, RMON, SNMP, MIB, Access list

Based on the tests which we performed, proposed system had shown good results. Without any intervention of the administrator, the system could be implemented in small and big organizations. In small organization admin can restrict the bandwidth so that other users who require access to internet can be used. In big organizations, system can automatically monitor and block user immediately so that organization reputation with not be defamed because the system has been automated. In future the system can be extended to servers so that we can restrict unauthorized access and reduce attacks to the server.


[1] Pries, R., et al. Traffic Measurement and Analysis of a Broadband Wireless Internet Access. in Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE 69th. 2009. [2] Xinyu, X. and S. Mishra. Where is the tight link in a home wireless broadband environment? in Modeling, Analysis & Simulation of Computer and Telecommunication Systems, 2009. MASCOTS '09. IEEE International Symposium on. 2009. [3] Alisha Cecil. A Summary of Network Traffic Monitoring and Analysis Techniques. Available from: http://www.cse.wustl.edu/~jain/cse567- 06/ftp/net_monitoring.pdf. [4] Prof. V Valli Kumari, K V Kalyan Chakravarthy. Analysis of userís behavior in the network using log data. IRACST- International Journal of Computer Networks and AWireless Communications (IJCNWC), Vol. 7 No.2 Mar 2017. Under printing [5] Jianxin, L. and B.J. Leon. A formal approach to model SNMP network management systems. in Computer Communications and Networks, 1995. Proceedings., Fourth International Conference on. 1995. [6] Prakash Chandrasekaran, Access Control Lists, ISEA, IMSc, 22 May 2006. [7] http://www.24onlinebilling.com/telecom-internetbilling- software-solution.html [8] www.cisco.com.