Network Security and Firewall Technology: A Step to Safety of National IT Vision

نویسندگان

  • Afolayan A. Obiniyi
  • Ezugwu E. Absalom
  • Mohammed Dikko
چکیده

With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously. DOI: 10.4018/jdtis.2011040103 International Journal of Dependable and Trustworthy Information Systems, 2(2), 40-60, April-June 2011 41 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. advantage of getting classified data, and the use of network resources can vanish leading to inefficient or lack of productivity. Establishments now have continual upsurge dependence on their information and communication systems as the nerve to day-to-day functions and for future stratagem of activities and thus have a lot of security problems to solve, this entails intranets and Internet. However the majority of network security threats originate from within the establishment, there is a growing threat of outside intrusion. This menace is escalated by connection of private (corporate) networks to public networks such as the Internet. In order to lessen the risk of outside parties having access to a private network, a firewall technology is implemented. Possibly it is best to explain first what a firewall is not: a firewall is not simply a router, host device, or groups of device that makes available security to a network. To a great extent, a firewall is a method of security; it assists in carrying out a larger security policy that states the services and accesses to be permitted. It is the provision of that policy in terms of a network setup, one or more host systems, routers, and other security measures such as advanced user identification in place of static passwords. The major reason for firewall system is to regulate access to or from guarded networks. It carries out a network access policy by strengthening the link to pass through the firewall, where they can be scrutinized and appraised. A firewall system can be a router, a personal computer, a host, or a group of hosts, configured precisely to protect a site or subnet from protocols and services that can be misused by hosts outside the subnets. A firewall system is in most cases situated at a higher-level gateway, such as a site’s linked to the Internet. However, firewall systems can be located at a lower-level gateway to provide protection for some smaller collection of hosts or subnets (Loshin, 2003). 2. FIREWALL TECHNOLOGY A firewall is a device designed to avoid unsanctioned access to or from a private network. Firewalls can be put into effect in both hardware and software, or both of them joined together. Firewalls are most often used to preclude unsanctioned Internet users from getting private networks linked to the Internet. All data entering or leaving the corporate network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria (Kaeo, 2001). Usually, firewalls are setup to guide against unsanctioned interactive logins from the outside world. This assists to disallow “hackers” from logging into machines on a network. More complex firewalls hinder traffic from the outside to the inside, but allow users on the inside to exchange information a little more freely with the outside. Firewalls are important since they can make available a single block point where security and audit can be enforced. Hypothetically, there are two types of firewalls a. Network Layer Firewalls: These types of firewalls make their decision based on the address of the point of origin, the endpoint address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from (Arkin, 2005). There is an upsurge of complexity in modern network layer firewalls, and they now uphold the information about the state of the links going through them at any time. The most vital things about a network layer firewalls is that traffic is routed directly through them. b. Application Layer Firewalls: These types of firewalls are hosts running proxy servers, which allow no traffic by straight connection between networks, and which accomplish complex logging and scrutiny of traffic going through them. Application layer firewalls can be used as network address translators, since traffic goes in one side and out the other, after having passed through an application that effectively masks the origin of the initiating 19 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/network-security-firewall-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

Design and Analysis of Distributed Honeypot System

Honeypot technology has been widely used to overcome the limitations of firewall technology, many intrusion detection systems, intrusion prevention systems, which detected several attacks but couldnot detect new attacks. This paper discusses the honeypot technology according to the existed shortage in the honeypot system and proposes a distributed system which remedy the existing deficiency in ...

متن کامل

A Mechanism for Detecting and Identifying DoS attack in VANET

VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...

متن کامل

A Mechanism for Detecting and Identifying DoS attack in VANET

VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...

متن کامل

Resolving the food security problem with an interdisciplinary approach

Food is one of the basic human needsand providing it is directly related to food security. The concept of food security in its historical process has been debated from various aspects of physical and economical access to healthy and nutritious food at all times. Food insecurity is considered a complex policy problem with different aspects. This problem requires a network of communication among ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJDTIS

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2011