Designing Firewalls: A Survey

نویسندگان

  • Angelos D. Keromytis
  • Vassilis Prevelakis
چکیده

A fi rewall is a collection of components interposed between two networks that fi lter traffi c between them according to some security policy [1]. Typically, fi rewalls rely on restrictions in the network topology to perform this fi ltering. One key assumption under this model is that everyone on the protected network(s) is trusted, since internal traffi c is not seen by the fi rewall and thus cannot be fi ltered; if that is not the case, then additional, internal fi rewalls have to be deployed in the internal network. Most of the complexity in using fi rewalls today lies in managing a large number of fi rewalls and ensuring they enforce a consistent policy across an organization’s network. The typical fi rewall confi guration, shown in Figure 3.1, usually comprises two packet fi ltering routers creating a restricted access network called the DMZ (demilitarized zone). The DMZ acts as a buffer between the internal (trusted) and external (untrusted) networks. This confi guration attempts to satisfy a number of goals:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Thinking About Firewalls

Many companies connect to the Internet, guarded by "firewalls" designed to prevent unauthorized access to their private networks. Despite this general goal, many firewalls fall widely apart on a continuum between ease of use and security. This paper attempts to describe some of the background and tradeoffs in designing firewalls. A vocabulary for firewalls and their components is offered, to pr...

متن کامل

The role of XML Firewalls for Web services

This paper explores the benefits of using XML Firewalls, also known as XML Proxies or SOAP Gateways, in order to secure Web services. First the commonly known threats of Web services will be discussed, followed by several techniques to prevent these threats. One of these methods is the use of firewalls which will be covered more extensively. Next the added value of XML Firewalls, a specialized ...

متن کامل

Firewall Policy Modeling, Analysis and Simulation: a Survey

Computer firewalls are widely used for security policy enforcement and access control. Current firewalls use various processing models and are configured using their own policy description languages. In this paper we will try to survey research efforts in the area of formalization of firwall operational sematnics and policy description languages and applications of such formal models and langua...

متن کامل

Firewall Configuration Errors Revisited

Practically every corporation that is connected to the Internet uses firewalls as the first line of its cyber-defense. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general tha...

متن کامل

A History and Survey of Network Firewalls

Firewalls are network devices which enforce an organization’s security policy. Since their development, various methods have been used to implement firewalls. These methods filter network traffic at one or more of the seven layers of the ISO network model, most commonly at the application, transport, and network, and data-link levels. In addition, researchers have developed some newer methods, ...

متن کامل

A Survey on Security Issues in Firewalls: A New Approach for Classifying Firewall Vulnerabilities

Along with the increasing growth of computer networks, security threats multiplies and accordingly improving and enhancing the network security devices and methods become a necessity. Firewalls as the first line of defense have irrefutable importance in securing a network; therefore improvement in this technology ensures higher level of security in computer networks. Any improvement or novel id...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007