Future Aspect of Firewall in Internet Security Saba Khan1 and Rakesh Gupta2 Department of Computer Science Engineering, Department of Electrical and Electronics Engineering Roorkee Engineering and Management Technology Institute Shamli, UP, India 1 [email protected] , [email protected] Abstract -- A firewall is software that establishes a security perimeter whose main task is to block or restrict both incoming and outgoing information over a network. These firewalls are basically not effective and appropriate for corporate environments to maintain security of information while it supports the free exchange of views. In this paper, we study network firewall that helps the corporate environment as well as the other networks that want to exchange information over the network. Firewall protects the flow of traffic over internet and is less restrictive of outward and inward information and also provides internal user the illusion of anonymous FTP and www connectivity to internet. Gateways Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does not see, so, effectively, everyone on the protected side is trusted. While this model has worked well for small to medium size networks, networking trends such as increased connectivity, higher line speeds, extranets, and telecommuting threaten to make it obsolete. To address the shortcomings of traditional firewalls, the concept of a “distributed firewall” has been proposed. In this scheme, security policy is still centrally defined, but enforcement is left up to the individual endpoints. IPSec may be used to distribute credentials that express parts of the overall network policy. Trust Management is a relatively new approach to solving the authorization and security policy problem, and was introduced in .Making use of public key cryptography for authentication, trust management dispenses with unique names as an indirect means for performing access control. Instead, it uses a direct binding between a public key and a set of authorizations, as represented by a safe programming language. This results in an inherently decentralized authorization system with sufficient expressibility to guarantee flexibility in the face of novel authorization scenarios. Keywords: Firewalls, Gateways, Packet filter, Firewall configuration, Working of application Firewalls, IPsec, Network security, Trust Management, I. INTRODUCTION COMPUTER networks are designed to connect two or more computers located at same or different corners in world. They are free to exchange information with any other computer. This kind of sharing is a great advantage for both individuals as well as for corporate world but as we know in today’s era, most important and confidential information is also exchanged on internet so attacker can do easily attack and can find out the important information and can harm the company in any manner. Most common type of attacks is: As corporation may have large amount of valuable data, leaking of which to competitors can do a great loss. There is also a danger from outside world such as viruses and worms; they can enter into corporate network. To prevent our data from these dangers we must ensure some security mechanisms such that inside information remain inside and outside information remain outside and prevent outside attackers from entering in corporate network. II. DEFENSIVE STRATEGIES Discussions about protecting networks usually focus on threats from the Internet, but internal users are also a threat. Indeed, surveys indicate that most unauthorized activities are perpetrated by internal users. In addition, organizations that connect with business partners over private networks create a potential avenue for attack. Users on the business partner's network may take advantage of the inter-company link to steal valuable information. Defence-in-depth is not a product, like a perimeter firewall. Instead, it is a security architecture that calls for the network to be aware and self-protective. In studying the problem of adding defence-in-depth, we’ve identified six key strategies that security architects can use to change significantly the security posture of enterprise wired and wireless LANs (WLANs). Strategy 1: Authenticate and authorize all network users the starting point for any deployment of defencein-depth is authentication. Authentication should be handled at the earliest point of connection of the system to the network: at the port level, even before the client is assigned a network address. Associated with every positive authentication must also be authorization: now that we know who this person is, what does it really mean? What can they do? Where can they go? Unless every user in the authentication database has the same privileges and accesses, authentication must be tightly linked to authorization [2]. The combination of positive authentication and user-based authorization information should form the basis for policy enforcement. Challenges in Authentication There are two key challenges in implementing network user authentication: the lack of a centralized authentication database, and the inability of some legacy systems to support modern protocols. The clear choice for network authentication is IEEE 802.1X, the IEEE standard for network authentication. Strategy 2: Use VLANs for traffic separation and coarse-grained security VLANs are, by their nature, unrouted chunks of network traffic. In most modern building networks, a fair amount of layer 3 IP routing takes place between wiring closets and the computer rooms. In a campus environment, routing is even more common. This makes pushing large numbers of VLANs around the infrastructure a fairly difficult-to-manage process [3]. Although most networks are heavily over-engineered with Gigabit (or 10 Gigabit) trunks, carrying a large number of VLANs around the network to represent different security profiles can stress not only the infrastructure, but also the management of the network itself [4]. This difficulty is compounded as WLANs are added to the network. To maintain simplicity, enable inter-SSID mobility and preserve the current IP addressing scheme, it is essential that the WLAN architecture of choice have the ability to enable multiple VLANs across a single SSID. This is typically true of new generation of centralized WLAN solutions. There are multiple ways to assign devices to VLANs dynamically, including: • based on 802.1X authentication information • based on Web-based authentication information • According to an SSID selected by the user in a wireless network • based on detection of some other attribute, such as the MAC address of the device or the location of the user Figure 1. Based on 802.1X authentication VLANs for traffic separation. Strategy 3: Place encryption throughout network to ensure privacy of data throughout the enterprise is becoming a signify cant issue. Because the network itself carries very sensitive data, there is a strong need to protect that data from accidental or intentional disclosure. The obvious case is in WLANs: no network manager would consider deploying a wireless network solution that does not enforce strong encryption [7]. In the wired environment, encryption can also be appropriate. The wake-up call for most network managers has come in the form of regulatory requirements. For any health care provider touched by the Health Insurance Portability and Accountability Act (HIPAA) requirements, wide-spread encryption of data even when inside of the corporate network may be required by law. Regulations such as California’s SB1386 (on publication of information when private information is exposed) are also pushing companies to encrypt more data to reduce the risk of disclosure of protected information. Strategy 4:Detect threats to the integrity of the network and remediate them the challenge for implementing internal IPS/AV schemes is that boxes have to be located in every closet and even then they cannot prevent a PC from potentially affecting its peer on the same network. A better way to address this problem is to encrypt traffic from each network jack and bring it into back to a central location where all the policies are applied. This method is no disruptive to addressing schemes and is far better than distributing multiple firewalls and IPS/AV systems in each wiring closet. If there is a trinity of security concerns in access control, privacy, and integrity, the third of these gets the least interest. The main reason for this is simple: detecting threats to the network can be very difficult. While some threats to network and data integrity are easy to identify and remediate, others can be extremely hard to detect---and even more difficult to protect against. While many companies focus on ‘towards the firewall’ threat management, the threats can come from anywhere: worms and viruses, wireless, guests, and careless or malicious insiders. It is worthwhile to identify as many of these threats as possible and either notify or attempt remediation. The security community’s first attempt at threat identification came in the form of IDS, intrusion detection systems. While IDS have proven their worth as a tool in the arsenal of the security analyst, most enterprises have discovered that the information they get from their IDS is not primarily useful in detection and remediation of immediate threats. Strategy 5: Include End-Point Security in Policy Enforcement User systems may range from tightly controlled laptops owned and managed by corporate IT to spyware-infected, keystroke logging, Trojan-hosting systems at public Internet kiosks. A user who successfully identifies to the network should be given different privileges depending on the system they are using for access. Most network managers are already aware of the problem of end-point security and have tools such as anti-virus, personal firewall, and patch management in place on many systems. The next step is verification: enforcement of policy regarding endpoint security by varying access based on the security posture of the end system. This technology and the thinking behind it is most evident in the world of SSL VPN where vendors are vying hard to differentiate themselves and incorporate end-point security posture detection and enforcement into their products. Remote access VPN tools, such as SSL VPN, 31 have a particular vulnerability in this area because they are specifically designed to extend network. [8] [7] One solution of this problem is the firewall. The main task of firewall is to regulate flow of information between computer networks. It protects network by standing between network and the outside world. The data transfer in any direction must pass through the firewall. III. APPLICATION GATEWAYS In order to control risks when internal server allow connections from internet we use a technique called application gateway, also known as proxy server because it acts like a substitute and decides about flow of information. Working of application gateways: (1) An internal user make connection with application gateways i.e. HTTP, FTP. (2) An application gateway asks the internal user with which it wants to communicate. (3) User then provides its id and password which is required to access services. (4) Now on behalf of user application gateway accesses the remote host. IV. FIREWALL CONFIGURATION A firewall is a combination of packet filters and application gateways. Depending on this, following are the configurations of firewalls. Firewall configurations Screened Host Firewall, Single Homed Bastion: In this type of configuration a firewall consists of following parts: (i) A packet filtering router (ii) An application gateway The main purpose of this type is as follows: Packet filter is used to ensure that incoming data is allowed only if it is destined for application gateway,[1] by verifying the destination address field of incoming IP packet. It also performs the same task on outing data by checking the source address field of outgoing IP packet. Application gateway is used to perform authentication and proxy functions. Screened Subnet Firewall: It provides the highest security among all firewall configurations. It is improved version over all the available scheme of firewall configuration. It uses two packet filters, one between the internet and application gateway and another between the application gateway and the internal network. Figure 2 . A screening router. Figure 3. Screening Router (Packet Filters). Screening routers can look at information related to the hard-wired address of a computer, its IP address (Network layer), and even the types of connections (Transport layer) and then provide filtering based on that information. A screening router may be a standalone routing device or a computer that contains two network interface cards (dual-homed system). The router connects two networks and performs packet filtering to control traffic between the networks. Proxy Server Gateways: Gateways work at a higher level in the protocol stack to provide more opportunities for monitoring and controlling access between networks. A gateway is like a middle-man, relaying messages from internal clients to external services [8] [9]. The proxy service changes the IP address of the client packets to essentially hide the internal client to the Internet, and then it acts as a proxy agent for the client on the Internet. Using proxies reduces the threat from hackers who monitor network traffic to glean information about computers on internal networks. The proxy hides the addresses of all internal computers. Traditionally, using proxies has reduced performance and transparency of access to other networks. However, current firewall products solve some of these problems. Figure 2 and Figure 3 illustrate the differences between screening routers and proxy servers, both of which are described in the next few sections. 32 system call overhead. Our current system focuses on controlling TCP connections. We plan to expand our implementation by adding an IP filter-like mechanism for a more fine grained control (perhaps based on some existing filtering package). V. FIREWALL POLICIES If an intruder can find a hole in your firewall, then the firewall has failed. There are no in-between states. Once a hacker is in, your internal network is at her mercy. If she hijacks an administrative account, you're in big trouble. If she hijacks an account with lesser privileges, all the resources available to that account are at risk. A New Data Center Architecture: The F5 approach to the firewall problem—the application delivery firewall solution converges security services into a single set of Application Delivery Controllers (ADCs) at the edge of the data center. F5 breaks new ground by introducing a new firewall product as well as integrated firewall management services into its flagship BIG-IP product family. BIG-IP Advanced Firewall Manager (AFM) is a high-performance, stateful, full-proxy network firewall designed to guard data centers against incoming threats that enter the network on the most widely deployed protocols—including HTTP/S, SMTP, DNS, and FTP. Organizations can combine BIG-IP AFM with F5's other security services to build a new security architecture based on the application intelligence of F5's application delivery firewall solution. No firewall can protect against inadequate or mismanaged policies. If a password gets out because a user did not properly protect it, your security is at risk. If an internal user dials out through an unauthorized connection, an attacker could subvert your network through this backdoor. Therefore, you must implement a firewall policy.[10] The F5 application delivery firewall solution provides network-layer protection with a much higher connection capacity than traditional firewalls this capacity enables BIG-IP LTM to manage the volume of a traffic onslaught while performing the port and IPbased access control services typically provided by a stateful firewall. Fig. 4 Attack Induced Firewall Failures Obviously, the firewall and the firewall policy are two distinct things that require their own planning and implementation. A weakness in the policy or the inability to enforce the policy will weaken any protection provided by even the best firewalls. If internal users find your policies too restrictive, they may go around them by connecting to the Internet through a personal modem. The firewall in this case is useless. You may not even know your systems are under attack because the firewall is guarding the wrong entrance. VI. FUTURE FIREWALL TECHNOLOGIES There are a number of possible extensions that we plan to work on in the process of building a more general and complete system. As part of the STRONGMAN project at the University of Pennsylvania, we are examining the application of higher-level security policy languages to large-scale network management. Keynote is used as a common language for expressing policies that can be distributed in different applications and systems. The distributed firewall is an important component in the STRONGMAN architecture. This is a subject of ongoing research. An alternate design would be to run the policy daemon inside the kernel, much like nfssvc(2). The policy daemon will then have direct access to the policy context queue, eliminating the Figure 5. The new paradigm replaces stateful firewall services with BIG-IP LTM in the data center architecture. Unified threat management: A new category of network security products -- called unified threat management (UTM) promises integration, convenience and protection from pretty much every threat out there; these are especially valuable for enterprise use. As Mike Rothman explains, the evolution of UTM 33 technology and vendor offerings make these products even more valuable to enterprises, Security expert Karen Scarf one defines UTM products as firewall appliances that not only guard against intrusion but also perform content filtering, spam filtering, application control, Web content filtering, intrusion detection and antivirus duties; in other words, a UTM device combines functions traditionally handled by multiple systems. These devices are designed to combat all levels of malicious activity on the computer network. Next Generation Firewall (NGFW): Next-generation firewalls integrate three key assets: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control. Like the introduction of stateful inspection in firstgeneration firewalls, NGFWs bring additional context to the firewall’s decision-making process by providing it with the ability to understand the details of the Web application traffic passing through it and taking action to block traffic that might exploit vulnerabilities. Next-generation firewalls combine the capabilities of traditional firewalls -- including packet, network address translation (NAT), URL blocking and virtual private networks (VPNs) -- with Quality of Service Triple Home Firewall: The third commonly used implementation of a firewall is the triple-homed bastion host, also called a three-homed firewall. The triple-homed bastion host often separates the Internet, the internal network and the DMZ. The advantage of a triple-homed bastion host is that Internet traffic avoids the company's internal network, which keeps the internal computers safe from the public. A three-homed University of Pennsylvania is aiming at simplifying security policy management by providing an application-independent policy specification language that can be compiled to application-specific Keynote credentials Policies are compiled to ACLs and distributed to the various hosts in the secured network, although a pull-based method can also be used. Connections to protected ports are reported to a local security manager which decides whether to drop, allow, or forward them (using DCE RPC) to a remote host, based on the ACLs. Perhaps the most relevant work is that of [2] In our approach, we introduce a three-layer system: a high-level policy language (equivalent in some sense to that used in Firmato), an intermediate level language (Keynote) used by the mechanisms, and the actual mechanisms. This allows us to: firewall is illustrated in Figure 6. Figure 6: Screened-subnet firewall This configuration uses external and internal routers. Each is configured so that its traffic flows only to or from the bastion host. This arrangement prevents any traffic from directly traversing the sub network, or DMZ. The external router uses standard filtering to restrict external access to the bastion host, and rejects any traffic that does not come from the bastion host. VII. RELATED WORK A lot of work has been done over the previous years in the area of (traditional) firewalls [8, 16, and 12]. [14] and [15] describe different approaches to host-based enforcement of security policy. These mechanisms depend on the IP addresses for access control, although they could potentially be extended to support some credential-based policy mechanism similar to what we describe in our paper. The Napoleon system [18] defines a layered group-based access control Scheme that is in some ways similar to the distributed firewall concept we have described, although it is mostly targeted to RMI environments like CORBA. Policies are compiled to Access Control Lists (ACLs) appropriate for each application (in our case, that would be each end host) and pushed out to them at policy creation or update time. The STRONGMAN project at the Express multi-application policies, rather than just packet filtering rules. Express Mixed-layer policies (e.g., policies of the type “email has to either be signed in the application layer or delivered over an IPsec SA that was authenticated with a credential matching the user in the From field of the email”). Permit delegation, which enables centralized management (since Keynote allows building arbitrary hierarchies of trust). Allows incremental and asynchronous policy updates, since, when policy changes, only the relevant Keynote credentials need to be updated and distributed (e.g., only those relevant to a specific firewall). 34 Table 1 -- Comparative data Comparative data Table for WAF (web application firewall), UTM (Unified threat management) NGF (next generation firewall) & THM (TRIPLE HOME FIREWALL) Characteristics definition F5 It incorporates company’s existing application delivery & security problems Weakness of simple password, overflow UTM It provides more protection than other firewalls NGF It works at layer 7,and scans classified applications THW It uses single firewall with 3 network interfaces Intrusion by unauthorised user, Dangerous SQL injections & buffer overflow attacks Complexity Not very much complex to manage Reduces complexity Detection Algorithm It understands web application traffic passing through it,& taking action to block traffic. provides safenet authentication solution Yes Regulatory compliance & easy management, content filtering More complex to manage, has layers of rules and policies Includes capabilities of traditional firewall NAT,IPF Those attacks that Separates intranet & DMZ network making it difficult to attack intranet Gain greater flexibility & throughput Additional layer make it a good solution for high speed Yes Yes Yes Partially No No Yes No No No Defends Against Performs user authentication Protection against DDos May Scan SSL VIII. CONCLUSION As we have discussed so far that firewall is very important part of computer defence against viruses, spyware, Trojans and other malwares and also between direct malicious attacks from outside and outside of network. A good firewall is the one that provide full protection of network without affecting the speed of our computer and our network access. In order to provide security, one should keep following things in mind: We should never install any software from suspicious sources. Always download from the respected sites available on internet. Use a firewall to monitor all data or information that we want to exchange over the internet. On every computer a firewall software must be installed else it will to become infected and very fast it will effect the all computers available on that network. IX . ACKNOWLEDGEMENT Authors would like to express their sincere gratitude to Dr. M.S.Rana, Director, REMTech-Shamli for his keen interest in the progress of the work. IX. REFERENCES [1] H. Abie, CORBA Firewall Security: Increasing the Security of CORBA Applications, Telektronikk Volume 96, No. 3-2000, pp. 53-64, January 2000. [2] E. Al-Shaer and H. Hamed. Management and translation of filtering security policies. Proc. IEEE Internation Conference on Communications, 2003. [3] Y. Bartal, A. Mayer, K. Ni ssim, an d A. Wool. Firmato: A novel firewal l anagemen tool kit. ACM T. Compu ter Systems, N ovember 2004. An earl ier version appeared in Proc. 20th IEEE Symp. on Security and Privacy, 1999. [4] S. Wooldridge. (2006, Aug. 6). “Application Security,” Electric Energy T&D Magazine, IEEE 802.1Q, 2005, IEEE Standard for Local and Metropolitan Area Networks-- Virtual Bridged Local Area Networks. [5] A. Hari, S. Suri, and G. M. Parulkar. Detecting and resolving packet filter conflicts. Proc. of IEEE INFOCOM, 2000. [6] T. Stang, F. Pourbayat, M. Burgess, G. Canright, K. Engo, and A. Weltzien. Archipelago: A network security analysis tool. In Proceedings of the 17th Large Installation Systems Administration 35 Conference, 2003. [7] J. Liu, Y. Xiao, S. Li, W. Liang, C. L. P. Chen, “Cyber Security and Privacy Issues in Smart Grids,” IEEE Commun. Surveys Tuts., I:10.1109/SURV.2011.122111.00145, in press. [8] Dr. Prof. P. K. Deshmukh, Dr. Prof. A. B. Bagwan, Ms. P. Kinage, Ms. S. A. Jadhav, Investigation and Analysis of Efficient Firewall Packet Filtering and Matching Algorithms. International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 8, October – 2012 ISSN: 2278-0181. [9] IEEE. IEEE Std 802.1X-2001, Port-Based Network Access Control, IEEE Std 802.1X- 2001 ed. IEEE, 2001. [10] R. Smith, S. Bhattachayra. “A Protocol and Simulation for Distributed Communicating Firewalls.” Proc. 23rd IEEE International Computer Software and Applications Conference (COMSPAC’99), October 1999.[11] Feng, T.,Bi, J.,Hu, H.Y.,Cao, H., "Networking as a Service: A CloudBased Network Architecture." Journal of Networks, Volume 6, no.7, July 2011, pp. 1084–1090. [12] M.A.F. Gutierrez and N. Ventura, "Mobile Cloud Computing Based on ServiceOriented Architecture: Embracing Network as a Service for Third-Party Application Service Providers," Proceedings, ITU Kaleidoscope 2011. [13] The Fully Networked Human— Innovations for Future Networks and Services (K-2011), pp.1–7, 12–14 December 2011. [14] TERENA Network Architects Workshop, Network as a Service principle virtual CPE as a Service, NAW.pdf, November 2012. [15] Benson, T., Shaikh, A.A.A., Sahu, S., "CloudNaaS: A Cloud Networking Platform for Enterprise Applications," Proceedings, Second ACM Symposium on Cloud Computing (SOCC '11),New York, NY, 2011. [16] Costa, P., "Bridging the Gap between Applications and Networks in Data Centers," ACM SIGOPS Operating Systems Review,vol.47,no. 1, pp.3–8, January 2013. 36
© Copyright 2026 Paperzz