0% found this document useful (0 votes)
93 views

Conventional and Next Generation Firewalls in Network Security and Its Applications

This document discusses conventional and next generation firewalls for network security. It provides an overview of traditional firewalls which filter traffic based on ports, states and protocols, whereas next generation firewalls also protect against advanced malware. Both support packet filtering but next generation firewalls additionally support VPN for more secure communication. The document also discusses the need for firewalls due to security risks from internet accessibility, and compares the advantages and disadvantages of conventional versus next generation firewalls.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views

Conventional and Next Generation Firewalls in Network Security and Its Applications

This document discusses conventional and next generation firewalls for network security. It provides an overview of traditional firewalls which filter traffic based on ports, states and protocols, whereas next generation firewalls also protect against advanced malware. Both support packet filtering but next generation firewalls additionally support VPN for more secure communication. The document also discusses the need for firewalls due to security risks from internet accessibility, and compares the advantages and disadvantages of conventional versus next generation firewalls.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Conventional and next generation firewalls in

network security and its applications


2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) | 978-1-6654-6200-6/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICCCIS56430.2022.10037674

Anaa Makhdoomi Naila Jan Palak


Dept. of ECE Dept. of ECE Dept. of ECE
IGDTUW, Delhi IGDTUW, Delhi DTU, Delhi
[email protected] [email protected] [email protected]

Nidhi Goel
Dept. of ECE
IGDTUW, Delhi
[email protected]

Abstract—A firewall acts as a security device to prevent and Network based [3]. Personal firewall is also known as a
unauthorized access and protection of data from malicious software firewall that is installed in personal devices i.e. com-
activities in a private network connection. It has become a puters and laptops. Network based firewall is installed at the
necessary part of network security in organizations. This paper
reviews conventional and next generation firewalls in the field edge of the network in order to connect Local Area Network
of network security. Traditional firewall is known to provide with the Broadband access [4]. Firewall is a necessary part of
protection to the network on the basis of ports, state and protocols network security which can block malware and quickly react
and traffic is filtered according to predefined rules whereas next to threats and can also block the attacks on the application
generation firewall focuses on providing protection against latest layer.
and advanced malware. Both traditional and NGFW support
packet filtering whereas NGFW also supports VPN for more In today’s world each and every person or organization has
secure communication. Need of firewall, it’s working, important access to the internet. The internet has proven to be very
security zones and flow of traffic in firewall has also been essential for organizations and businesses to work effectively
elaborated through this review. Traditional firewall provides pro- and exchange data and information easily with the customers
tection against attacks from the internet but attackers scrutinize and other organizations [5]. Internet comes with so many
vulnerabilities inside the network by targeting less protected web
servers. For this distributed firewall architecture is required that benefits but there are also some risks associated with it. The
provides security against insider attacks. Distributed firewall has internet accessibility allows attackers to breach the network
centralized capabilities and allow fine gain access control. This and perform malicious activities [3].
paper presents the comparative analysis between conventional
and next generation firewall and various advantages and dis- A. Need of firewall
advantages of conventional firewall. This paper also discusses To provide security to computer network, firewall plays the
the introduction of NAT firewall which allows all the devices in
an internal network to share the same gateway to the external role of one of the most effective technologies [6].There are
network whereas in PAT firewall port number is assigned instead organizations and companies which need firewalls in order
of IP address to the private network. to protect them from cyber attacks and reduce risk to their
Index Terms—Traditional firewall, Distributed firewall, Net- business and keep data safe. Around 60% small startups close
work Security, Next Generation Firewall within 6 months of a cyber-attack [7]. Without a firewall,
I. I NTRODUCTION businesses can lose their important data which can affect their
productivity and reliability. Hackers and attackers can intrude
Firewall is a security device or a group of devices used to in the personal and private data of the organization. These
allow or deny incoming and outgoing traffic based on rules and attackers can damage, remove or use this data for malicious
policies [1]. These rules and policies are designed in order to activities [8]. Therefore it is important to use an effective
protect the inside network from the outside network. Firewall firewall so that the data is monitored efficiently and there is
usually protects internal networks from threats and malicious no delay in traffic flow.
activities while also allowing the exchange of information Effective firewall can protect an organization from various
from inside to outside [2]. threats and malicious activities such as :
Firewall can be divided into two main categories: Personal
• Remote login-Attackers can remotely login to one’s de-
vice and steal information and important data.

978-1-6654-6200-6/22/$31.00 ©2022 IEEE 964


Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.
• Hijacking Email session - Hackers can hack the SMTP
server in one’s network and send spam and malicious
mails to others using that email.
• Application and operating system backdoor vulnerabil-
ities- Some applications can give access to criminals to
access one’s network using bugs or some features.
• Denial of service- DoS is an attack that can penetrate an
organization’s server by sending a request to connect.
• Viruses- They can easily spread through mails and net-
works and can result in unwanted threats. This is one of Fig. 1. Working of firewall
the common and serious threats that organizations suffer
from.
• Malicious macros- Cyber attackers can create some C. Existing work in this field
rules or patterns to tell the application to do things that Mukammala et al. [10] in their paper have reviewed various
organization does not allow and can result in damaged traditional firewall methods including packet filtering, cloud
and disrupted data. firewall, circuit level gateway and proxy firewall. In this paper
they have discussed the advantages and disadvantages of these
firewalls along with the brief introduction of the advantages of
B. Working of firewall
next generation firewall. This paper reviews the limitations of
Firewall is a network security tool that acts as a filter to traditional firewalls but have not provided an effective solution
protect trusted networks from outside attackers by restricting for the associated problems. Aakanksha Chopra [2] in her
the traffic flow and acts as a first line of defense for a network work has provided a review of traditional firewalls and their
[9]. It selects which traffic is to be permitted or blocked on limitations along with the evolution of distributed firewalls.
the basis of policies and rules as depicted in Fig. 1. It acts as This review [2] focuses on the need of firewall, basics of
a watchman at the network entry and allows only legitimate firewall, problems with conventional firewall and has briefly
traffic from trusted IP addresses and it is also known as explained the role of distributed firewall. Manish Kumar [11]
conventional or perimeter firewall. It is used to differentiate in his work has reviewed the architecture of firewall. He has
between legitimate traffic and malicious activities and allows compared various features, advantages and disadvantages of
them on the basis of predefined policies. These policies are traditional firewall with the pros and cons of next generation
defined on the basis of source and destination addresses. It firewalls. Firkhan Ali [12] has reviewed various technologies
also blocks traffic from suspicious addresses to prevent any and types of firewalls in his work. He has discussed the
cyber breach. The type of traffic that is permitted or blocked advantages and disadvantages of these firewalls to make it easy
depends on the firewall that is used. for practitioners while choosing a firewall to write policies.
When intranet tries to communicate with the internet, there The motivation behind the present paper is to provide a brief
are two types of traffic: permitted traffic and blocked traffic. review in the field of firewall. This paper presents the review of
Permitted traffic is a traffic which follows the prerequisite all the traditional methods, evolution of firewall, deployment
rules and is allowed to establish a connection with the internet styles of firewall and working of firewall. Table I provides the
whereas blocked traffic does not meet the set of rules and comparison of network based firewall and host based firewall
therefore this traffic is restricted. Similarly when the internet deployment techniques. This paper also reviews distributed
wants to establish a connection with the private network, firewall along with its uses and importance. NAT and PAT
there are two types of traffic: requested allowed traffic and firewall with all the advantages and disadvantages have been
random/unknown traffic. Specified or requested traffic is that explained in this paper. This paper also explains all the security
traffic which is requested by the private network. Firewall zones and interfaces present in a firewall and also describes
checks the state table if the traffic is requested by the intranet, the complete traffic flow through all the interfaces.
it will pass whereas if it is not requested by the private network
it will be dropped by the firewall. D. Deployment methods in a firewall
Firewall has different functionalities on different layers of OSI This section discusses various deployment methods of
and TCP/IP models. If the firewall is present at the network firewalls i.e. software, hardware and cloud based firewall.
layer it can easily find out whether the data packet is from Table I presents a comparison between hardware and software
a correct and genuine source. On the other hand it cannot firewall and Fig.2 depicts the structure of these two firewall
determine the contents of the packet whereas firewall present deployment methods respectively.
at the transport layer have more information regarding these Hardware Firewall is a physical device used to create a barrier
data packets. Application layer firewall is highly selective in between the internet and intranet. It monitors the incoming
providing access as they have all the information regarding and outgoing traffic in the network and allows only those
the data packets [2]. traffic which are permitted according to the rules and policies
set by the organization. When traffic enters the firewall,

2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) 965
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.
TABLE I
C OMPARISON BETWEEN H ARDWARE AND S OFTWARE FIREWALL

Parameter Hardware firewall Software firewall


Definition Device that filters traffic Software application
between private network installed in a device
and public network
Host/ Network based Host based
Network
Function Network level Host level
level
Internal It does not provide It provides security and
Protection security within the protection in same VLAN Fig. 3. Security zones of firewall
(VLAN) same VLAN
Mobility All devices need to be Since this firewall is
migrated to new location located within the system This section concludes that software based firewall provides
therefore easy to move security to individual devices whereas hardware based firewall
Network Network protection is It is lower as compared to
Protection higher as compared network based firewall provides protection to the entire network. Hardware or network
to software firewall based firewall provides higher level of network security as
Cost Less expensive More expensive compared to software or host based firewall and is less
Scalabilty Easy to scale as it doesn’t Difficult to scale as no. of
require efforts to include installations also increases expensive than its counterpart.
higher bandwidth with the increase in hosts
E. Security zones and traffic flow in firewall
Security Zone is a part of a network which has some specific
security requirements. These zones consist of one or more
interfaces on which the policies are applied. Security zones
are separated from each other using firewall and they also
communicate to each other through the firewall.
There are two major zones in the firewall: Internal or Inside
and External or Outside. Internal or Inside interface is also
known as a private zone and it consists of information and
data that is confidential to the organization and should not
be accessed by everyone. External or Outside interface, also
known as Public zone is the interface which is present outside
Fig. 2. Deployment Methods in Firewall the organization. Apart from these two zones, some firewall
networks also have demilitarised zones commonly known as
DMZ. DMZ protects the internal network by facing the outside
it is monitored and inspected by the firewall. It provides zone directly and not putting the inside zone at risk [14].
higher and consistent security. Hardware based firewall don’t These zones have different security levels attached to them.
consume power and other resources as they are self sufficient By default, Inside has the security level 100 and other zones
applications [13]. It is also known as network based firewall. have security level 0. Security level can be assigned to these
Hardware firewall can be used in organizations where there interfaces as per the security of information they provide.
are more than one devices and it is difficult to configure as Traffic that is established from inside the network is inspected
compared to other firewall. by the firewall and by default all the traffic is allowed from
Software firewall is an application that can be installed on the inside interface to other interfaces except for restrictions
personal devices such as laptops or computers in order to if applied by the organization.
protect them from malicious threats. It inspects all the open Traffic from outside zone to inside is by default blocked by
ports on the device and monitors the traffic coming through the firewall except the traffic requested by the inside zone. All
them [13]. It is also known as host firewall. Software fire- other traffic that is not a response is dropped by the firewall.
wall requires resources from CPU and RAM of computer. Traffic from the DMZ towards the inside zone is also blocked
It provides protection to single devices against the malicious by default. It is also passed if it is requested from inside.
threats and viruses. Hardware and software firewall can be Traffic from DMZ to outside is permitted on the basis of
used together to improve the security and for higher protection selected rules and requirements and similarly for outside to
of data and private networks. DMZ. All the response from DMZ back to the external zone
Cloud firewall, also known as hosted firewall can be managed is allowed.
by MSSPs. It can monitor both internal network and third
party applications. It can be used in large organizations where II. T RADITIONAL F IREWALLS
the resources have gaps or can also be useful for smaller Firewall can be divided into various types on the basis
enterprises with less people. This firewall is considered to be of operation and deployment technique. There are four types
part of proxy firewall [10]. of firewall from various generations such as packet filtering

966 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.
TABLE II
P ROS AND C ONS OF VARIOUS F IREWALLS

Firewall Pros Cons


Easy to filter header, Cost friendly Does not provide user authentication, Complex setup
Packet Filtering High processing speed, Minimal use of resource Application layer filtering not supported, Difficult to setup ACLs
Manageable and simple setup, Relatively cost friendly Does not protect individual data packets, Content filtering not supported
Circuit Gateway Easy to implement, Higher efficiency than proxy firewall Does not provide monitoring at application layer, Only accepts TCP connection
Offer higher protection against attacks, Less no of open- Requires higher skillset for configuration, Authenticated connections are
Stateful Inspection ports required for operation, Can block DoS attacks not supported, Does not provide security for stateless connections.
Provides higher security to network, Higher protection Response time is slow, Difficult to configure
Proxy Firewall against attacks, User credentials are kept anonymous Performance of network is affected
Firewall is accessible from a single source Less cost friendly than other firewalls, Performance of network is hindered
Next Generation Inspects traffic from layer to layer 7 of OSI model Difficult to process, More resources required for configuration and deployment
Less number of resources required, Supports IPS and IDS

port address is stored. It inspects the TCP and further allow


the traffic according to the connection [17]. The performance
of this firewall depend on the state table and how well the
packet is filtered.

D. Application layer based firewall


Also known as proxy firewall, it doesn’t send the request
directly to the internal network, it is first directed to proxy
firewall and connection is established through it. It performs
Fig. 4. Types of Firewall
both packet filtering and stateful inspection of data. This fire-
wall inspects the content inside the data packets and provides
firewall. circuit level gateway, application layer firewall and more security. Due to the additional security, transfer rate of
stateful inspection firewall. Fig. 5 depicts the taxonomy of all data packets is lower in proxy firewall.
the traditional firewalls in network security. Table II provides III. N EXT G ENERATION F IREWALL
the advantages and disadvantages of various types of firewall.
A next-generation firewall is an advanced security device
A. Packet filtering firewall that combines properties of various conventional firewalls with
This firewall is the first generation firewall and the most latest and advanced features. It is a third generation firewall
basic firewall. It is present at the network layer of the OSI device that performs deep inspection of data packets along
model and inspects the IP address of the source and destination with application layer filtering and prevention from intrusions
along with the respective port and also monitors the protocol. using IPS. NGFW is used to overcome the limitations of the
Packet filtering firewalls are stateless firewalls as they do not traditional firewall [18]. Along with that NGFW can protect
keep records of the connection that are established [15]. These the internal network from DDoS attacks and provides more
packets are filtered on the basis of address of source and secure transmission of data using SSL. This firewall combines
destination as well as port number. Packet filtering firewall various techniques such as IPS, URL, antivirus, deep filtering
can’t see the contents inside the packet. These firewalls are with traditional techniques to provide higher level of security.
easy to implement as they do not require much resources but
A. Unified threat management firewall
they are not enough efficient .
Unified threat management firewall also known as UTM
B. Circuit Level firewall provides multiple security services and features at a particular
Circuit level firewall is the second generation of firewall point within the network [19]. It investigates and checks
which works at the session layer of OSI model. It checks the data traffic passing inside and outside of the network
and inspects the TCP connections that are established [16]. It within a firewall. UTM firewall is a type of NGFW which
creates a virtual connection on behalf of the internal network classifies users on the basis of username rather than IP address.
in order to hide the IP address of the network. It is one of the This firewall provides additional security in comparison to
simpler firewall as it only inspects TCP handshake. Similar to conventional firewall by supporting IPS, IP spoofing and other
packet filtering firewall it cannot inspect the content present advanced features. It is one the cost effective and flexible
inside the data packet. Therefore, it is not highly secure. firewalls. It is a multi feature firewall that allows filtering of
content inside of the data packets, protection against spams,
C. Stateful inspection firewall viruses and also provides prevention from leakage of the data.
This firewall performs packet inspection but along with that The main aim of UTM is to reduce complexity by finding
it also keeps record of the connections that are established. It easy and simplified security solution to manage and deploy a
creates a state table where all the information such as source security system. UTM firewall provide additional advantages
IP and source port address and destination IP and destination as they can be swapped easily if the technology fails and can

2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)


Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.
967
be easily deployed by the user as compared to other firewalls. TABLE III
[20]. C OMPARISON BETWEEN C ONVENTIONAL AND N EXT GENERATION
FIREWALL

B. Distributed firewall Parameters Conventional Firewall NGFW


Traditional firewall depends on confined topology i.e. it Port filtering
Support Yes Yes
allows all traffic from trusted side whereas blocks traffic from IP address
an untrusted zone [21]. It works on the policy that all the traffic filtering Support Yes Yes
from intranet is trusted whereas all the traffic from the internet Protocol based
filtering Support Yes Yes
is untrusted. There are various limitations of the traditional Intrusion Prevention
four firewalls that are being used for example packet filtering System Support No Yes
firewall does not support sophisticated models as it works only Network Address
Translation Support Yes Yes
on network layer whereas circuit level gateway only works at Virtual Private
session layer and it is not able to separate different packets. Network Support Yes Yes
Application layer or proxy firewall provides higher security Awareness at
but affect network performance. Stateful firewall is expensive application layer No Yes
OSI layers
as compared to other firewalls and they are complex to use. covered Layer 2 to 4 Layer 2 to 7
In order to solve these problems a distributed solution is Throughput Low High
proposed and this is known as a distributed firewall [22]. Visibilty and
Control of application Supports partially Supports completely
Distributed firewall is a software application which protects
the whole network from any unwanted intrusion. When we
apply distributed firewall along with conventional firewall, it traffic is tunnelled through virtual private networks and is
provides an additional layer of security to the network keeping encrypted before it goes to the outside network therefore it
throughput high for network traffic. If there is an attack from becomes difficult for NAT firewall to differentiate requested
inside traditional firewall cannot protect the network. In such and untrusted traffic. To overcome this issue many VPNs have
cases distributed firewall protects from insider attacks. Dis- NAT firewall implemented which means that VPN filters the
tributed firewall provides centralised capabilities and allows unwanted and trusted traffic instead of NAT firewall. Some
fine gain access control [23]. It also allows and denies traffic VPNs have NAT firewall implemented by default. Limitation
on the basis of security policies. This firewall supports push of VPN with NAT firewall is that the private address and
and pull distribution which involves checking whether the traffic can be easily tracked and monitored by VPN providers.
server is active or not, and further requesting the policies and The problem can be overcomed by assigning the same public
to ensure that updated policies are communicated to the host IP address to all the devices in the virtual private network
[24]. without assigning separate private IP addresses. This provides
Distributed firewall can work as an additional layer of security an additional layer of security and makes it difficult to track
for the business in order to maintain a secure network and an individual device in the private network. Other limitations
deal with new problems which are not solved by conventional of NAT firewall include lack of user protection from phishing
firewall [25]. It can be theoretically expanded without a limit and man in the middle attacks [28].
to maintain security for public and private networks, making Port address translation also allows one public IP to represent
it a valuable firewall in IT security. all devices in the private network. Unlike NAT, here port
number is assigned instead of IP address to the private network
C. Introduction to NAT and PAT firewall
[26]. Once a request is made from an internal device, PAT
Network address translation allows all the devices in an firewall replaces the device address with an internal compliant
internal network to share the same gateway to the external address and also attaches a port number at the end. Firewall
network. This gateway can be a router or a firewall device and stores all the information in the table so that it remembers the
all the devices in the private network will have the same public port number used for each device inside the network [28]. PAT
IP as that of the gateway [26]. NAT firewall only allows traffic firewall is more popular as it lessens the number of private IP
from outside to pass through if it is requested by the private addresses an organization needs to have. Apart from this it
network. Any unwanted data packets and untrusted requests is also useful for VPN services as all the traffic that leaves
are dropped in order to prevent unwanted communication of through VPN tunnel will have the same IP address attached
internet and intranet. If a data packet has a private IP attached to them [28].
to it then it is passed otherwise the request will be dropped.
Outside networks can exchange information using the public IV. D ISCUSSION AND ANALYSIS
IP address of the gateway and cannot see the private IP address This section discusses the comparison between conventional
of the device inside the private network and this process is and next generation firewall along with the research gap in the
known as IP masquerading [27]. field of network security. Table III presents the comparative
In the case of VPN, traffic is encrypted and then routed analysis of conventional and next generation firewall on the
towards the destination through the intermediate server. As basis of various parameters.

968 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.
A. Comparative analysis between conventional and next gen- R EFERENCES
eration firewall [1] What is a firewall and how does it work? — digitalocean.
Next generation firewall and conventional firewall are used https://www.digitalocean.com/community/tutorials/what-is-a-firewall-
and-how-does-it-work.
to provide security to organizations by performing stateful [2] Aakanksha Chopra. Security issues of firewall. Int. J. P2P Netw. Trends
inspection of data packets and supporting various features Technol, 22(1):4–9, 2016.
such as NAT, PAT and VPN. Next generation firewall is more [3] William Stallings, Lawrie Brown, Michael D Bauer, and Michael
Howard. Computer security: principles and practice, volume 2. Pearson
sophisticated version of conventional firewall as it support a Upper Saddle River, 2012.
variety of advanced features such as IPS, application layer [4] Thaier Hayajneh, Bassam J Mohd, Awni Itradat, and Ahmad Nahar Qut-
filtering, IDS etc. Next generation firewall operates at layer toum. Performance and information security evaluation with firewalls.
International Journal of Security and Its Applications, 7(6):355–372,
2 to layer 7 of OSI model whereas conventional firewall 2013.
operates at layer 2 to layer 4. Next generation firewall can [5] Nidhi Goel, Balasubramanian Raman, and Indra Gupta. Mobile worms
easily encrypt and decrypt SSL traffic whereas conventional and viruses. In Information Security in Diverse Computing Environ-
ments, pages 206–229. IGI Global, 2014.
firewall cannot inspect or decrypt SSL traffic [29]. Comparison [6] Xinzhou He. Research on computer network security based on firewall
between NGFW and conventional firewall has been discussed technology. In Journal of Physics: Conference Series, volume 1744,
in table III. page 042037. IOP Publishing, 2021.
[7] 60 percent of small companies close within 6 months of be-
ing hacked. https://cybersecurityventures.com/60-percent-of-small-
B. Identified Research Gap and future scope companies-close-within-6-months-of-being-hacked/: :text=In
[8] Robert La Lau. Network basics and firewall. In Practical Internet Server
Firewall is known for providing a secure gateway and Configuration, pages 71–97. Springer, 2021.
enabling protection from malicious attacks for safety and [9] Yashraj Singh Tomar and Nayan Bhile. First line of defense: Firewall.
integrity of vital data. This paper has focused on discussing 2021.
[10] Padma Priya Mukkamala and Sindhu Rajendran. A survey on the
conventional and next generation firewall in the field of cyber- different firewall technologies. International Journal of Engineering
security. This field demands a thorough review and work on Applied Sciences and Technology, 5(1):363–365, 2020.
distributed firewall policies and its associated topologies.There [11] Paper1186.pdf. https://ijarsct.co.in/Paper1186.pdf.
[12] Firkhan Ali Bin Hamid Ali. A study of technology in firewall system.
has been a very limited amount of research done on the In 2011 IEEE Symposium on Business, Engineering and Industrial
implementation of Distributed and other firewalls. A detailed Applications (ISBEIA), pages 232–236. IEEE, 2011.
review can be done to discuss various firewall policies and [13] Ricky Panchal. Firewalls: Hardware vs. soft-
ware. Dosegljivo: http://www4. ncsu. edu/˜ kksi-
access control list that can be used while writing a policy. vara/sfwr4c03/projects/4c03projects/RPanch al-Project. pdf [Dostopano
This will in turn be helpful for researchers and cybersecurity 25.10. 2015], 2005.
professionals in choosing the correct firewall according to the [14] Network security zones. https://www.kwtrain.com/blog/network-
security-zones: :text=A
user requirements. An extensive research is needed in this field
[15] E Eugene Schultz. 83-10-41 types of firewalls. Internet: http://www.
in order to ensure no data is breached so that an effective and ittoday. info/AIMS/DSM/83-10-41. pdf,[Nov. 5, 2014], 2021.
safe environment is developed for user communication through [16] HAO WANG. Network firewall. 2004.
the internet. Going forward, there is a need to enhance the [17] Gerhard Cronje. Choosing the best firewall. GIAC level one security,
2001.
effectiveness of cyber security in general though research and [18] Ido Dubrawsky. Firewall evolution-deep packet inspection. Security
implementation of different firewalls. Focus, 29:21, 2003.
[19] Harri Lehmonen. Improving network security with watchguard utm
firewall. 2017.
V. C ONCLUSION [20] Vinit Agham. Unified threat management. International Research
Journal of Engineering and Technology, 3(4):32–36, 2016.
Firewall is a first line of security which inspects all the [21] Sotiris Ioannidis, Angelos D Keromytis, Steve M Bellovin, and
traffic going inside and outside a network. This paper presents Jonathan M Smith. Implementing a distributed firewall. In Proceedings
a comparative analysis of traditional and NGFW . It also of the 7th ACM conference on Computer and communications security,
pages 190–199, 2000.
elaborates the need and working of a basic firewall. The [22] J Lane Thames, Randal Abler, and David Keeling. A distributed firewall
review defines that next generation firewall blocks advanced and active response architecture providing preemptive protection. In
malware from entering a secure network. It supports deep Proceedings of the 46th Annual Southeast Regional Conference on XX,
pages 220–225, 2008.
inspection of packets and intrusion prevention as well.
[23] What is a distributed firewall? - network and security virtualization -
Introduction of NAT and PAT firewall has further helped in vmware. https://blogs.vmware.com
providing an extra security by protecting private IP addresses [24] What is distributed firewall? — barracuda networks.
and assigning single public IP address to an organization. https://www.barracuda.com/glossary/distributed-firewall.
[25] What is a distributed firewall? — fortinet. https://www.fortinet.com
This review has also discussed security zones and traffic [26] Anchit Bansal and Priyanka Goel. Simulation and analysis of network
flow in firewall. Inside, outside and DMZ security zones address translation (nat) & port address translation (pat) techniques. Int.
have been discussed where inside has the highest security Journal of Engineering Research and Application, 7(7):50–56, 2017.
[27] 11.ip masquerade and network address translation - linux network
level by default and outside has the lowest security level. We administrator’s guide, second edition [book]. https://www.oreilly.com
conclude that advancement in firewall will further promote [28] What is a nat firewall, how does it work and when do you need one?
secure zones and help in protection of important data for https://www.comparitech.com/blog/vpn-privacy/nat-firewall/: :text=A
[29] Next-generation firewall vs traditional firewall: What’s the difference
organizations. - aplikas. https://aplikas.com/next-generation-firewall-vs-traditional-
firewall

2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) 969
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.

You might also like