A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko
{"title":"网络安全与防火墙技术:迈向国家IT安全愿景的一步","authors":"A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko","doi":"10.4018/jdtis.2011040103","DOIUrl":null,"url":null,"abstract":"With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously. DOI: 10.4018/jdtis.2011040103 International Journal of Dependable and Trustworthy Information Systems, 2(2), 40-60, April-June 2011 41 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. advantage of getting classified data, and the use of network resources can vanish leading to inefficient or lack of productivity. Establishments now have continual upsurge dependence on their information and communication systems as the nerve to day-to-day functions and for future stratagem of activities and thus have a lot of security problems to solve, this entails intranets and Internet. However the majority of network security threats originate from within the establishment, there is a growing threat of outside intrusion. This menace is escalated by connection of private (corporate) networks to public networks such as the Internet. In order to lessen the risk of outside parties having access to a private network, a firewall technology is implemented. Possibly it is best to explain first what a firewall is not: a firewall is not simply a router, host device, or groups of device that makes available security to a network. To a great extent, a firewall is a method of security; it assists in carrying out a larger security policy that states the services and accesses to be permitted. It is the provision of that policy in terms of a network setup, one or more host systems, routers, and other security measures such as advanced user identification in place of static passwords. The major reason for firewall system is to regulate access to or from guarded networks. It carries out a network access policy by strengthening the link to pass through the firewall, where they can be scrutinized and appraised. A firewall system can be a router, a personal computer, a host, or a group of hosts, configured precisely to protect a site or subnet from protocols and services that can be misused by hosts outside the subnets. A firewall system is in most cases situated at a higher-level gateway, such as a site’s linked to the Internet. However, firewall systems can be located at a lower-level gateway to provide protection for some smaller collection of hosts or subnets (Loshin, 2003). 2. FIREWALL TECHNOLOGY A firewall is a device designed to avoid unsanctioned access to or from a private network. Firewalls can be put into effect in both hardware and software, or both of them joined together. Firewalls are most often used to preclude unsanctioned Internet users from getting private networks linked to the Internet. All data entering or leaving the corporate network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria (Kaeo, 2001). Usually, firewalls are setup to guide against unsanctioned interactive logins from the outside world. This assists to disallow “hackers” from logging into machines on a network. More complex firewalls hinder traffic from the outside to the inside, but allow users on the inside to exchange information a little more freely with the outside. Firewalls are important since they can make available a single block point where security and audit can be enforced. Hypothetically, there are two types of firewalls a. Network Layer Firewalls: These types of firewalls make their decision based on the address of the point of origin, the endpoint address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from (Arkin, 2005). There is an upsurge of complexity in modern network layer firewalls, and they now uphold the information about the state of the links going through them at any time. The most vital things about a network layer firewalls is that traffic is routed directly through them. b. Application Layer Firewalls: These types of firewalls are hosts running proxy servers, which allow no traffic by straight connection between networks, and which accomplish complex logging and scrutiny of traffic going through them. Application layer firewalls can be used as network address translators, since traffic goes in one side and out the other, after having passed through an application that effectively masks the origin of the initiating 19 more pages are available in the full version of this document, which may be purchased using the \"Add to Cart\" button on the publisher's webpage: www.igi-global.com/article/network-security-firewall-","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Network Security and Firewall Technology: A Step to Safety of National IT Vision\",\"authors\":\"A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko\",\"doi\":\"10.4018/jdtis.2011040103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously. DOI: 10.4018/jdtis.2011040103 International Journal of Dependable and Trustworthy Information Systems, 2(2), 40-60, April-June 2011 41 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. advantage of getting classified data, and the use of network resources can vanish leading to inefficient or lack of productivity. Establishments now have continual upsurge dependence on their information and communication systems as the nerve to day-to-day functions and for future stratagem of activities and thus have a lot of security problems to solve, this entails intranets and Internet. However the majority of network security threats originate from within the establishment, there is a growing threat of outside intrusion. This menace is escalated by connection of private (corporate) networks to public networks such as the Internet. In order to lessen the risk of outside parties having access to a private network, a firewall technology is implemented. Possibly it is best to explain first what a firewall is not: a firewall is not simply a router, host device, or groups of device that makes available security to a network. To a great extent, a firewall is a method of security; it assists in carrying out a larger security policy that states the services and accesses to be permitted. It is the provision of that policy in terms of a network setup, one or more host systems, routers, and other security measures such as advanced user identification in place of static passwords. The major reason for firewall system is to regulate access to or from guarded networks. It carries out a network access policy by strengthening the link to pass through the firewall, where they can be scrutinized and appraised. A firewall system can be a router, a personal computer, a host, or a group of hosts, configured precisely to protect a site or subnet from protocols and services that can be misused by hosts outside the subnets. A firewall system is in most cases situated at a higher-level gateway, such as a site’s linked to the Internet. However, firewall systems can be located at a lower-level gateway to provide protection for some smaller collection of hosts or subnets (Loshin, 2003). 2. FIREWALL TECHNOLOGY A firewall is a device designed to avoid unsanctioned access to or from a private network. Firewalls can be put into effect in both hardware and software, or both of them joined together. Firewalls are most often used to preclude unsanctioned Internet users from getting private networks linked to the Internet. All data entering or leaving the corporate network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria (Kaeo, 2001). Usually, firewalls are setup to guide against unsanctioned interactive logins from the outside world. This assists to disallow “hackers” from logging into machines on a network. More complex firewalls hinder traffic from the outside to the inside, but allow users on the inside to exchange information a little more freely with the outside. Firewalls are important since they can make available a single block point where security and audit can be enforced. Hypothetically, there are two types of firewalls a. Network Layer Firewalls: These types of firewalls make their decision based on the address of the point of origin, the endpoint address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from (Arkin, 2005). There is an upsurge of complexity in modern network layer firewalls, and they now uphold the information about the state of the links going through them at any time. The most vital things about a network layer firewalls is that traffic is routed directly through them. b. Application Layer Firewalls: These types of firewalls are hosts running proxy servers, which allow no traffic by straight connection between networks, and which accomplish complex logging and scrutiny of traffic going through them. Application layer firewalls can be used as network address translators, since traffic goes in one side and out the other, after having passed through an application that effectively masks the origin of the initiating 19 more pages are available in the full version of this document, which may be purchased using the \\\"Add to Cart\\\" button on the publisher's webpage: www.igi-global.com/article/network-security-firewall-\",\"PeriodicalId\":298071,\"journal\":{\"name\":\"Int. J. Dependable Trust. Inf. Syst.\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Dependable Trust. Inf. Syst.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/jdtis.2011040103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Dependable Trust. Inf. Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/jdtis.2011040103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Network Security and Firewall Technology: A Step to Safety of National IT Vision
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously. DOI: 10.4018/jdtis.2011040103 International Journal of Dependable and Trustworthy Information Systems, 2(2), 40-60, April-June 2011 41 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. advantage of getting classified data, and the use of network resources can vanish leading to inefficient or lack of productivity. Establishments now have continual upsurge dependence on their information and communication systems as the nerve to day-to-day functions and for future stratagem of activities and thus have a lot of security problems to solve, this entails intranets and Internet. However the majority of network security threats originate from within the establishment, there is a growing threat of outside intrusion. This menace is escalated by connection of private (corporate) networks to public networks such as the Internet. In order to lessen the risk of outside parties having access to a private network, a firewall technology is implemented. Possibly it is best to explain first what a firewall is not: a firewall is not simply a router, host device, or groups of device that makes available security to a network. To a great extent, a firewall is a method of security; it assists in carrying out a larger security policy that states the services and accesses to be permitted. It is the provision of that policy in terms of a network setup, one or more host systems, routers, and other security measures such as advanced user identification in place of static passwords. The major reason for firewall system is to regulate access to or from guarded networks. It carries out a network access policy by strengthening the link to pass through the firewall, where they can be scrutinized and appraised. A firewall system can be a router, a personal computer, a host, or a group of hosts, configured precisely to protect a site or subnet from protocols and services that can be misused by hosts outside the subnets. A firewall system is in most cases situated at a higher-level gateway, such as a site’s linked to the Internet. However, firewall systems can be located at a lower-level gateway to provide protection for some smaller collection of hosts or subnets (Loshin, 2003). 2. FIREWALL TECHNOLOGY A firewall is a device designed to avoid unsanctioned access to or from a private network. Firewalls can be put into effect in both hardware and software, or both of them joined together. Firewalls are most often used to preclude unsanctioned Internet users from getting private networks linked to the Internet. All data entering or leaving the corporate network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria (Kaeo, 2001). Usually, firewalls are setup to guide against unsanctioned interactive logins from the outside world. This assists to disallow “hackers” from logging into machines on a network. More complex firewalls hinder traffic from the outside to the inside, but allow users on the inside to exchange information a little more freely with the outside. Firewalls are important since they can make available a single block point where security and audit can be enforced. Hypothetically, there are two types of firewalls a. Network Layer Firewalls: These types of firewalls make their decision based on the address of the point of origin, the endpoint address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from (Arkin, 2005). There is an upsurge of complexity in modern network layer firewalls, and they now uphold the information about the state of the links going through them at any time. The most vital things about a network layer firewalls is that traffic is routed directly through them. b. Application Layer Firewalls: These types of firewalls are hosts running proxy servers, which allow no traffic by straight connection between networks, and which accomplish complex logging and scrutiny of traffic going through them. Application layer firewalls can be used as network address translators, since traffic goes in one side and out the other, after having passed through an application that effectively masks the origin of the initiating 19 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/network-security-firewall-