International Journal For Multidisciplinary Research
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Volume 6 Issue 1
Access Control List (ACL) Compliance Verification and Alarm Systems: Strengthening Network Security
|Access Control Lists (ACLs) are a cornerstone in securing network traffic. This study focuses on the automation and efficiency of ACL compliance verification systems, with an emphasis on enhancing network security. By leveraging alarm
systems for continual checks and maintaining ACL rule order, network security remains robust against potential threats. A major contribution of this paper is proposing an innovative method for deriving Border Gateway Protocol (BGP) ACL terms using automated scripts, enabling organizations to quickly adapt to
network topology changes. Our findings underscore the effectiveness of integrating automation in ACL management, reducing manual errors and optimizing resource allocation in network security."
|Access Control Lists (ACLs) , Network security, Automation, DevOps, Firewalls, Border Gateway protocol, Alarm systems.
|Computer > Network / Security
|Volume 6, Issue 1, January-February 2024
|Access Control List (ACL) Compliance Verification and Alarm Systems: Strengthening Network Security - Yamini Kannan - IJFMR Volume 6, Issue 1, January-February 2024. DOI 10.36948/ijfmr.2024.v06i01.12734
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.