Evaluating firewall tools and techniques in enhancing network security

Network attacks DDOS Firewall IDS traffic analysis Replay attack

Authors

  • Dr.Kamalakannan Machap
    dr.kamalakannan@staffemail.apu.edu.my
    School of Technology Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia
  • Hua Qiang School of Technology Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia
Vol. 6 No. 1 (2022)
Original Research
January 16, 2026

Downloads

Currently, the network is indispensable and eliminates the limitation of distance for communication and organization. The advancement of technology in networking has brought countless conveniences. Computer networks have become the norm in today's corporate world, and networks now carry more traffic than ever before — not only from computers, but also from smartphones, which are becoming a significant element of it.

However, in addition to providing consumers with convenience, the network also poses several risks and obstacles. These problems manifest themselves in a variety of ways, including ransomware, phishing attempts, and malware attacks. In the network environment, users can employ tools and security technologies to solve security issues and obstacles. Although it is difficult for a network to achieve complete security, we can employ the most up-to-date techniques and technology to reduce the likelihood of security threats.

The most significant reasons to secure our network are the continual updates of tools and the ongoing evolution of technology. Network attacks are a possibility in many network fields. Hackers can attack the destination by employing attack methods based on network technology advancements. It can be difficult for users to tell which virus is being disguised by an attacker. It may not be effective if the user is using improper technologies or old tools to protect the machine. This paper will present some suggested tools or strategies for resolving network problems and obstacles.