Network Security and Firewall Technology: A Step to Safety of National IT Vision

A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko
{"title":"Network Security and Firewall Technology: A Step to Safety of National IT Vision","authors":"A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko","doi":"10.4018/jdtis.2011040103","DOIUrl":null,"url":null,"abstract":"With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously. DOI: 10.4018/jdtis.2011040103 International Journal of Dependable and Trustworthy Information Systems, 2(2), 40-60, April-June 2011 41 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. advantage of getting classified data, and the use of network resources can vanish leading to inefficient or lack of productivity. Establishments now have continual upsurge dependence on their information and communication systems as the nerve to day-to-day functions and for future stratagem of activities and thus have a lot of security problems to solve, this entails intranets and Internet. However the majority of network security threats originate from within the establishment, there is a growing threat of outside intrusion. This menace is escalated by connection of private (corporate) networks to public networks such as the Internet. In order to lessen the risk of outside parties having access to a private network, a firewall technology is implemented. Possibly it is best to explain first what a firewall is not: a firewall is not simply a router, host device, or groups of device that makes available security to a network. To a great extent, a firewall is a method of security; it assists in carrying out a larger security policy that states the services and accesses to be permitted. It is the provision of that policy in terms of a network setup, one or more host systems, routers, and other security measures such as advanced user identification in place of static passwords. The major reason for firewall system is to regulate access to or from guarded networks. It carries out a network access policy by strengthening the link to pass through the firewall, where they can be scrutinized and appraised. A firewall system can be a router, a personal computer, a host, or a group of hosts, configured precisely to protect a site or subnet from protocols and services that can be misused by hosts outside the subnets. A firewall system is in most cases situated at a higher-level gateway, such as a site’s linked to the Internet. However, firewall systems can be located at a lower-level gateway to provide protection for some smaller collection of hosts or subnets (Loshin, 2003). 2. FIREWALL TECHNOLOGY A firewall is a device designed to avoid unsanctioned access to or from a private network. Firewalls can be put into effect in both hardware and software, or both of them joined together. Firewalls are most often used to preclude unsanctioned Internet users from getting private networks linked to the Internet. All data entering or leaving the corporate network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria (Kaeo, 2001). Usually, firewalls are setup to guide against unsanctioned interactive logins from the outside world. This assists to disallow “hackers” from logging into machines on a network. More complex firewalls hinder traffic from the outside to the inside, but allow users on the inside to exchange information a little more freely with the outside. Firewalls are important since they can make available a single block point where security and audit can be enforced. Hypothetically, there are two types of firewalls a. Network Layer Firewalls: These types of firewalls make their decision based on the address of the point of origin, the endpoint address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from (Arkin, 2005). There is an upsurge of complexity in modern network layer firewalls, and they now uphold the information about the state of the links going through them at any time. The most vital things about a network layer firewalls is that traffic is routed directly through them. b. Application Layer Firewalls: These types of firewalls are hosts running proxy servers, which allow no traffic by straight connection between networks, and which accomplish complex logging and scrutiny of traffic going through them. Application layer firewalls can be used as network address translators, since traffic goes in one side and out the other, after having passed through an application that effectively masks the origin of the initiating 19 more pages are available in the full version of this document, which may be purchased using the \"Add to Cart\" button on the publisher's webpage: www.igi-global.com/article/network-security-firewall-","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Dependable Trust. Inf. Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/jdtis.2011040103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously. DOI: 10.4018/jdtis.2011040103 International Journal of Dependable and Trustworthy Information Systems, 2(2), 40-60, April-June 2011 41 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. advantage of getting classified data, and the use of network resources can vanish leading to inefficient or lack of productivity. Establishments now have continual upsurge dependence on their information and communication systems as the nerve to day-to-day functions and for future stratagem of activities and thus have a lot of security problems to solve, this entails intranets and Internet. However the majority of network security threats originate from within the establishment, there is a growing threat of outside intrusion. This menace is escalated by connection of private (corporate) networks to public networks such as the Internet. In order to lessen the risk of outside parties having access to a private network, a firewall technology is implemented. Possibly it is best to explain first what a firewall is not: a firewall is not simply a router, host device, or groups of device that makes available security to a network. To a great extent, a firewall is a method of security; it assists in carrying out a larger security policy that states the services and accesses to be permitted. It is the provision of that policy in terms of a network setup, one or more host systems, routers, and other security measures such as advanced user identification in place of static passwords. The major reason for firewall system is to regulate access to or from guarded networks. It carries out a network access policy by strengthening the link to pass through the firewall, where they can be scrutinized and appraised. A firewall system can be a router, a personal computer, a host, or a group of hosts, configured precisely to protect a site or subnet from protocols and services that can be misused by hosts outside the subnets. A firewall system is in most cases situated at a higher-level gateway, such as a site’s linked to the Internet. However, firewall systems can be located at a lower-level gateway to provide protection for some smaller collection of hosts or subnets (Loshin, 2003). 2. FIREWALL TECHNOLOGY A firewall is a device designed to avoid unsanctioned access to or from a private network. Firewalls can be put into effect in both hardware and software, or both of them joined together. Firewalls are most often used to preclude unsanctioned Internet users from getting private networks linked to the Internet. All data entering or leaving the corporate network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria (Kaeo, 2001). Usually, firewalls are setup to guide against unsanctioned interactive logins from the outside world. This assists to disallow “hackers” from logging into machines on a network. More complex firewalls hinder traffic from the outside to the inside, but allow users on the inside to exchange information a little more freely with the outside. Firewalls are important since they can make available a single block point where security and audit can be enforced. Hypothetically, there are two types of firewalls a. Network Layer Firewalls: These types of firewalls make their decision based on the address of the point of origin, the endpoint address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from (Arkin, 2005). There is an upsurge of complexity in modern network layer firewalls, and they now uphold the information about the state of the links going through them at any time. The most vital things about a network layer firewalls is that traffic is routed directly through them. b. Application Layer Firewalls: These types of firewalls are hosts running proxy servers, which allow no traffic by straight connection between networks, and which accomplish complex logging and scrutiny of traffic going through them. Application layer firewalls can be used as network address translators, since traffic goes in one side and out the other, after having passed through an application that effectively masks the origin of the initiating 19 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/network-security-firewall-
网络安全与防火墙技术:迈向国家IT安全愿景的一步
随着公共互联网的爆炸式增长,连接到互联网的企业网络如果没有得到充分的保护,很容易受到破坏性攻击。黑客、病毒、蠕虫、特洛伊木马和间谍软件试图侵犯隐私。本研究探讨了这些威胁是如何影响企业网络的,以及如何减少它们。将microtik routerOS配置为检测这些威胁的路由器。网络地址转换和包过滤,其中配置的关键特性使网络对未经授权的用户隐藏,并过滤可能反映恶意行为的不需要的流量。配置和测试在尼日利亚扎里亚Ahamdu Bello大学Iya Abubakar计算机中心进行。一开始,目标网络充满了病毒、蠕虫、特洛伊木马、间谍软件,容易受到未经授权用户的攻击。由于威胁对带宽的影响,网络的信号强度通常很差。防火墙被配置为过滤掉固有的危险服务,使网络暴露在更少的风险中。经过研究,网络的性能和效率得到了极大的提高。DOI: 10.4018 / jdtis.2011040103信息系统学报,2(2),40-60,四月-六月2011版权所有©2011,IGI Global。未经IGI Global书面许可,禁止以印刷或电子形式复制或分发。获取机密数据的优势和网络资源的使用可能会消失,导致效率低下或缺乏生产力。企业现在对其信息和通信系统的依赖程度不断上升,作为日常功能和未来活动战略的神经,因此有许多安全问题需要解决,这需要内部网和互联网。然而,大多数网络安全威胁来自企业内部,外部入侵的威胁也在不断增加。随着私人(公司)网络与Internet等公共网络的连接,这种威胁进一步升级。为了降低外部各方访问专用网络的风险,实现了防火墙技术。也许最好先解释一下防火墙不是什么:防火墙不仅仅是路由器、主机设备或为网络提供安全性的设备组。在很大程度上,防火墙是一种安全方法;它有助于执行更大的安全策略,说明允许的服务和访问。它是根据网络设置、一个或多个主机系统、路由器和其他安全措施(如代替静态密码的高级用户标识)提供该策略。建立防火墙系统的主要目的是为了规范被保护网络的进出。它通过加强通过防火墙的链接来执行网络访问策略,在防火墙中可以对它们进行审查和评估。防火墙系统可以是一台路由器、一台个人计算机、一台主机或一组主机,它被精确地配置为保护站点或子网免受可能被子网外主机滥用的协议和服务的侵害。在大多数情况下,防火墙系统位于更高级的网关,例如连接到Internet的站点。然而,防火墙系统可以位于较低级别的网关,为一些较小的主机或子网集合提供保护(Loshin, 2003)。2. 防火墙技术防火墙是一种设备,用于防止未经批准的访问或从专用网络。防火墙可以在硬件和软件中同时起作用,或者两者结合在一起。防火墙最常用于阻止未经批准的互联网用户将专用网络连接到互联网。所有进入或离开公司网络的数据都要通过防火墙,防火墙检查每个数据包并阻止那些不符合指定安全标准的数据包(Kaeo, 2001)。通常,设置防火墙是为了防止来自外部世界的未经批准的交互式登录。这有助于阻止“黑客”登录到网络上的机器。更复杂的防火墙会阻碍从外部到内部的流量,但允许内部的用户与外部更自由地交换信息。防火墙很重要,因为它们可以提供一个可以实施安全性和审计的块点。假设有两种类型的防火墙:a.网络层防火墙:这些类型的防火墙根据起始点的地址、端点地址和单个IP数据包中的端口做出决定。一个简单的路由器是传统的网络层防火墙,因为它不能做出特别复杂的决定,比如一个数据包实际上是在和什么说话,或者它实际上来自哪里(Arkin, 2005)。 现代网络层防火墙的复杂性急剧上升,它们现在随时维护有关经过它们的链路状态的信息。关于网络层防火墙的最重要的事情是流量直接通过它们路由。b.应用层防火墙:这些类型的防火墙是运行代理服务器的主机,它不允许网络之间的直接连接流量,并完成复杂的日志记录和通过它们的流量审查。应用层防火墙可以用作网络地址翻译器,因为流量从一侧进入另一侧,在通过一个有效地掩盖初始来源的应用程序之后,本文档的完整版本中有19个以上的页面,可以使用出版商网页上的“添加到购物车”按钮购买:www.igi-global.com/article/network-security-firewall-
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信