Preview

Firewall in Computer Networks

Powerful Essays
Open Document
Open Document
3508 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Firewall in Computer Networks
CHAPTER-1
INTRODUCTION

1.1 Firewall in computer networks

Firewall: A set of related programs, located at a network gateway server, which protects the resources of a private network from users from other networks using security policies.

The Internet has made large amounts of information available to the average computer user at home, in business and in education. For many people, having access to this information is no longer just an advantage, it is essential. Yet connecting a private network to the Internet can expose critical or confidential data to malicious attack from anywhere in the world. Users who connect their computers to the Internet must be aware of these dangers, their implications and how to protect their data and their critical systems. Firewalls can protect both individual computers and corporate networks from hostile intrusion from the Internet, but must be understood to be used correctly.

But even with firewalls there is a concern of policy anomalies. Firewall policy management is a challenging task due to the complexity and interdependency of policy rules. This is further exacerbated by the continuous evolution of network and system environments. The process of configuring a firewall is tedious and error prone. Therefore, effective mechanisms and tools for policy management are crucial to the success of firewalls. The quickly advancing changes to the protocols and the network changes demand stronger and more efficient firewall policies. Some new technologies in the field of firewall are suggested.

CHAPTER-2
LITERATURE SURVEY

Firewalls have existed since about 1987, and several surveys and histories have already been written. However, none of them provide both the depth and breadth of this survey, nor do they focus on the peer-reviewed literature describing firewall technology. In 1994, Alec Muffett wrote a paper which provided an excellent review of the firewall policies and architectures of the time. This paper



References: 1) Hu, H., Ahn, G.H, Ketan Kulkarni, K. “Detecting and Resolving Firewall Policy Anomalies” IEEE Transactions On Dependable And Secure Computing, Vol. 9, No. 3, May/June 2012. 2) Vensmer, A., Sebastian Kiesel, S. “DynFire: Dynamic Firewalling in Heterogeneous Environments” World Congress On Internet Security (WorldCIS-2012) 3) http://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htm 4) http://www.interhack.net/pubs/network-security/

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Hogg, S. (2011, July 31). Retrieved February 20, 2013, from Firewall Administration Techniques and Tools: http://www.networkworld.com/community/blog/firewall-administration-techniques-and-tools…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    NT1110 Module5 Lab

    • 254 Words
    • 2 Pages

    Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    Defense in Depth provides the university several layers of protection. Starting at the endpoints, host intrusion protection (HIPS), should be installed on each Device. Properly installed, HIPS will not permit the installation of unauthorized programs. This was the root cause of the (D)DoS recently experienced. At the routers access control lists (ACLs) must be put in place to allow only traffic with a legitimate protocol and destination. Between the routers and the endpoint a firewall solution must be put in place. The firewall must be configured to allow only allowed protocols and port numbers to communicate with specific destinations. Between the firewall and endpoint a (D)DoS a detection tool (such as Arbor’s Prevail) must be put in place. This measure not only allows for quick detection of (D)DoS it also permits the automatic mitigation of the…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    With computers and IT exploding as it has over the past few years, so has the individuals that try to gain access to your machine. A firewall is a device that applies the security to your network. They come in all different sizes for different setups. Firewalls have two connections. One is to the computer/network and the other is connected to your Internet connection.…

    • 1097 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    4. Network Admissions Control - Where a client (supplicant) must pass muster with the networks policy server before being able to connect to resources on the network. Internal firewalls at the host level - These can be software based (personal firewalls) or hardware based such as the 3Com embedded firewalls and policy server that are host-based, hardware-embedded firewalls for desktops, servers and notebooks. These firewalls help to protect individual systems inside or outside the perimeter, wherever an additional layer of security is needed.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    The most modern method of firewall scanning that does not rely on memory intensive examination is ‘Stateful inspection’. A Stateful firewall holds significant attributes of each connection of trusted information for the duration of session. These attributes which are collectively known as state of the connection may include ip addresses, ports involved in the network and number of packets being…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit Btec Diploma It

    • 950 Words
    • 4 Pages

    Firewall configuration: A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Intrusion detection systems monitor the most vulnerable points or “hot spots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Worldwide Network Security

    • 7779 Words
    • 32 Pages

    The worldwide network security market grew by 6.1% in 2011. The total market, which includes firewall, unified threat management (UTM), intrusion detection and prevention (IDP), and virtual private network (VPN) solutions, reached $7.4 billion in 2011. UTM revenue saw the strongest growth at 17.4% and reached $2.2 billion. The IDP market saw more moderate growth at 4.5%, reaching $1.9 billion. The firewall segment remained the largest component of the market at $2.4 billion but grew only a modest 2.9% over 2010. Revenue from standalone VPN solutions fell 5.3% to $0.9 billion. IDC expects the firewall and VPN segments to remain fairly flat over the forecast period. UTM and IDP solutions will drive the overall market to $10.1 billion in 2016, representing a compound annual growth rate (CAGR) of 6.4%. Other highlights include:  Application awareness and control will continue to be a key feature demanded by organizations to address the ever-blurring line between personal and corporate use of the Web and better enable business processes and productivity.  Further, the "bring your own device" (BYOD) trend will necessarily continue to drive more granularity and context into policy management.  Integrating more advanced malware detection will be one of the key drivers in the UTM/next-generation firewall and IDP spaces.…

    • 7779 Words
    • 32 Pages
    Powerful Essays
  • Better Essays

    Cited: 1. White, Bill, Mike Ebbers, Demerson Ciloti, and Gwen Sandra. IBM z/OS V1R11 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking. N.p.: IBM Redbooks, 2011. 39-40.…

    • 2214 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Firewalls

    • 964 Words
    • 4 Pages

    | A packet filtering firewall makes decisions about which network traffic to allow by examining information in the IP packet header such as source and destination addresses, ports, and service protocols. A packet filtering firewall: * Uses access control lists (ACLs) or filter rules to control traffic. * Operates at OSI layer 3 (Network layer). * Offers high performance because it only examines addressing information in the packet header. * Can be implemented using features that are included in most routers. * Is a popular solution because it is easy to implement and maintain, has a minimal impact on system performance, and is fairly inexpensive. A packet filtering firewall is considered a…

    • 964 Words
    • 4 Pages
    Good Essays