DOI QR코드

DOI QR Code

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed (Department of Information Technology, College of Computing and Informatics, Saudi Electronic University) ;
  • Motmi, Ahmed (Department of Information Technology, College of Computing and Informatics, Saudi Electronic University) ;
  • Abdelhaq, Maha (Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University)
  • Received : 2021.04.05
  • Published : 2021.04.30

Abstract

This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.

Keywords

References

  1. D. Appelt, C. D. Nguyen, A. Panichella, and L. C. Briand, "A machine-learning-driven evolutionary approach for testing web application firewalls," IEEE Transactions on Reliability, vol. 67, pp. 733-757, 2018. https://doi.org/10.1109/TR.2018.2805763
  2. N. Altwaijry, "Identification of Network Attacks Using a Deep Learning Approach," International Journal of Computer Science and Network Security (IJCSNS), vol. 20, p. 201, 2020. https://doi.org/10.22937/IJCSNS.2020.20.04.25
  3. T. Abbes, A. Bouhoula, and M. Rusinowitch, "Detection of firewall configuration errors with updatable tree," International Journal of Information Security, vol. 15, pp. 301-317, 2016. https://doi.org/10.1007/s10207-015-0290-0
  4. K. Kaur and D. Rao, "Automation the process of unifying the change in the firewall performance," International Journal of Computer Science and Network Security (IJCSNS), 2014.
  5. N. Ammari, A. A. El Mrabti, A. Abou El Kalam, and A. A. Ouahman, "Firewall anti-leak of sensitive data," Procedia Computer Science, vol. 83, pp. 1226-1231, 2016. https://doi.org/10.1016/j.procs.2016.04.256
  6. U. P. D. Ani, H. He, and A. Tiwari, "Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective," Journal of Cyber Security Technology, vol. 1, pp. 32-74, 2017. https://doi.org/10.1080/23742917.2016.1252211
  7. K. Sattar, K. Salah, M. Sqalli, R. Rafiq, and M. Rizwan, "A Delay-Based Countermeasure Against the Discovery of Default Rules in Firewalls," Arabian Journal for Science and Engineering, vol. 42, pp. 833-844, February 01 2017. https://doi.org/10.1007/s13369-016-2359-0
  8. C. Diekmann, L. Hupel, J. Michaelis, M. Haslbeck, and G. Carle, "Verified iptables firewall analysis and verification," Journal of automated reasoning, vol. 61, pp. 191-242, 2018. https://doi.org/10.1007/s10817-017-9445-1
  9. S. Prabakaran and R. Ramar, "Stateful firewall-enabled software-defined network with distributed controllers: A network performance study," International Journal of Communication Systems, vol. 32, p. e4237, 2019. https://doi.org/10.1002/dac.4237
  10. P. Cotret, G. Gogniat, and M. J. S. Florez, "Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls," Microprocessors and Microsystems, vol. 42, pp. 127-141, 2016. https://doi.org/10.1016/j.micpro.2016.01.013
  11. T. Kurek, M. Niemiec, and A. Lason, "Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality," International Journal of Information Security, vol. 15, pp. 235-250, June 01 2016. https://doi.org/10.1007/s10207-015-0292-y
  12. N. Ammari, A. A. E. Mrabti, A. A. E. Kalam, and A. A. Ouahman, "Firewall Anti-Leak of Sensitive Data," Procedia Computer Science, vol. 83, pp. 1226-1231, 2016. https://doi.org/10.1016/j.procs.2016.04.256
  13. Y. Nomura and N. Salzetta, "Why firewalls need not exist," Physics Letters B, vol. 761, pp. 62-69, 2016. https://doi.org/10.1016/j.physletb.2016.08.003
  14. G. Hooft, "The Firewall Transformation for Black Holes and Some of Its Implications," Foundations of Physics, vol. 47, pp. 1503-1542, December 01 2017. https://doi.org/10.1007/s10701-017-0122-3
  15. M. Yeasmin, N. Akter, M. H. Kabir, J. Hossain, and K.-P. Shih, "Performance evaluation of multi-cloud compared to the single-cloud under varying firewall conditions," Cogent Engineering, vol. 5, 2018. https://doi.org/10.1080/23311916.2018.1442109
  16. R. Mohan, A. Yazidi, B. Feng, and J. Oommen, "On optimizing firewall performance in dynamic networks by invoking a novel swapping window-based paradigm," International Journal of Communication Systems, vol. 31, p. e3773, 2018. https://doi.org/10.1002/dac.3773
  17. P. Cotret, G. Gogniat, and M. J. Sepulveda Florez, "Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls," Microprocessors and Microsystems, vol. 42, pp. 127-141, 2016. https://doi.org/10.1016/j.micpro.2016.01.013
  18. S. Prabakaran and R. Ramar, "Stateful firewall-enabled software-defined network with distributed controllers: A network performance study," International Journal of Communication Systems, vol. n/a, p. e4237. https://doi.org/10.1002/dac.4237
  19. A. Khoumsi, M. Erradi, and W. Krombi, "A formal basis for the design and analysis of firewall security policies," Journal of King Saud University - Computer and Information Sciences, vol. 30, pp. 51-66, 2018. https://doi.org/10.1016/j.jksuci.2016.11.008
  20. U. P. D. Ani, H. He, and A. Tiwari, "Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective," Journal of Cyber Security Technology, vol. 1, pp. 32-74, 2016. https://doi.org/10.1080/23742917.2016.1252211
  21. M. Dunn Cavelty and A. Wenger, "Cyber security meets security politics: Complex technology, fragmented politics, and networked science," Contemporary Security Policy, pp. 1-28, 2019.