Conventional and Next Generation Firewalls in Network Security and Its Applications
Conventional and Next Generation Firewalls in Network Security and Its Applications
Nidhi Goel
Dept. of ECE
IGDTUW, Delhi
[email protected]
Abstract—A firewall acts as a security device to prevent and Network based [3]. Personal firewall is also known as a
unauthorized access and protection of data from malicious software firewall that is installed in personal devices i.e. com-
activities in a private network connection. It has become a puters and laptops. Network based firewall is installed at the
necessary part of network security in organizations. This paper
reviews conventional and next generation firewalls in the field edge of the network in order to connect Local Area Network
of network security. Traditional firewall is known to provide with the Broadband access [4]. Firewall is a necessary part of
protection to the network on the basis of ports, state and protocols network security which can block malware and quickly react
and traffic is filtered according to predefined rules whereas next to threats and can also block the attacks on the application
generation firewall focuses on providing protection against latest layer.
and advanced malware. Both traditional and NGFW support
packet filtering whereas NGFW also supports VPN for more In today’s world each and every person or organization has
secure communication. Need of firewall, it’s working, important access to the internet. The internet has proven to be very
security zones and flow of traffic in firewall has also been essential for organizations and businesses to work effectively
elaborated through this review. Traditional firewall provides pro- and exchange data and information easily with the customers
tection against attacks from the internet but attackers scrutinize and other organizations [5]. Internet comes with so many
vulnerabilities inside the network by targeting less protected web
servers. For this distributed firewall architecture is required that benefits but there are also some risks associated with it. The
provides security against insider attacks. Distributed firewall has internet accessibility allows attackers to breach the network
centralized capabilities and allow fine gain access control. This and perform malicious activities [3].
paper presents the comparative analysis between conventional
and next generation firewall and various advantages and dis- A. Need of firewall
advantages of conventional firewall. This paper also discusses To provide security to computer network, firewall plays the
the introduction of NAT firewall which allows all the devices in
an internal network to share the same gateway to the external role of one of the most effective technologies [6].There are
network whereas in PAT firewall port number is assigned instead organizations and companies which need firewalls in order
of IP address to the private network. to protect them from cyber attacks and reduce risk to their
Index Terms—Traditional firewall, Distributed firewall, Net- business and keep data safe. Around 60% small startups close
work Security, Next Generation Firewall within 6 months of a cyber-attack [7]. Without a firewall,
I. I NTRODUCTION businesses can lose their important data which can affect their
productivity and reliability. Hackers and attackers can intrude
Firewall is a security device or a group of devices used to in the personal and private data of the organization. These
allow or deny incoming and outgoing traffic based on rules and attackers can damage, remove or use this data for malicious
policies [1]. These rules and policies are designed in order to activities [8]. Therefore it is important to use an effective
protect the inside network from the outside network. Firewall firewall so that the data is monitored efficiently and there is
usually protects internal networks from threats and malicious no delay in traffic flow.
activities while also allowing the exchange of information Effective firewall can protect an organization from various
from inside to outside [2]. threats and malicious activities such as :
Firewall can be divided into two main categories: Personal
• Remote login-Attackers can remotely login to one’s de-
vice and steal information and important data.
2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) 965
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.
TABLE I
C OMPARISON BETWEEN H ARDWARE AND S OFTWARE FIREWALL
966 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.
TABLE II
P ROS AND C ONS OF VARIOUS F IREWALLS
968 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.
A. Comparative analysis between conventional and next gen- R EFERENCES
eration firewall [1] What is a firewall and how does it work? — digitalocean.
Next generation firewall and conventional firewall are used https://www.digitalocean.com/community/tutorials/what-is-a-firewall-
and-how-does-it-work.
to provide security to organizations by performing stateful [2] Aakanksha Chopra. Security issues of firewall. Int. J. P2P Netw. Trends
inspection of data packets and supporting various features Technol, 22(1):4–9, 2016.
such as NAT, PAT and VPN. Next generation firewall is more [3] William Stallings, Lawrie Brown, Michael D Bauer, and Michael
Howard. Computer security: principles and practice, volume 2. Pearson
sophisticated version of conventional firewall as it support a Upper Saddle River, 2012.
variety of advanced features such as IPS, application layer [4] Thaier Hayajneh, Bassam J Mohd, Awni Itradat, and Ahmad Nahar Qut-
filtering, IDS etc. Next generation firewall operates at layer toum. Performance and information security evaluation with firewalls.
International Journal of Security and Its Applications, 7(6):355–372,
2 to layer 7 of OSI model whereas conventional firewall 2013.
operates at layer 2 to layer 4. Next generation firewall can [5] Nidhi Goel, Balasubramanian Raman, and Indra Gupta. Mobile worms
easily encrypt and decrypt SSL traffic whereas conventional and viruses. In Information Security in Diverse Computing Environ-
ments, pages 206–229. IGI Global, 2014.
firewall cannot inspect or decrypt SSL traffic [29]. Comparison [6] Xinzhou He. Research on computer network security based on firewall
between NGFW and conventional firewall has been discussed technology. In Journal of Physics: Conference Series, volume 1744,
in table III. page 042037. IOP Publishing, 2021.
[7] 60 percent of small companies close within 6 months of be-
ing hacked. https://cybersecurityventures.com/60-percent-of-small-
B. Identified Research Gap and future scope companies-close-within-6-months-of-being-hacked/: :text=In
[8] Robert La Lau. Network basics and firewall. In Practical Internet Server
Firewall is known for providing a secure gateway and Configuration, pages 71–97. Springer, 2021.
enabling protection from malicious attacks for safety and [9] Yashraj Singh Tomar and Nayan Bhile. First line of defense: Firewall.
integrity of vital data. This paper has focused on discussing 2021.
[10] Padma Priya Mukkamala and Sindhu Rajendran. A survey on the
conventional and next generation firewall in the field of cyber- different firewall technologies. International Journal of Engineering
security. This field demands a thorough review and work on Applied Sciences and Technology, 5(1):363–365, 2020.
distributed firewall policies and its associated topologies.There [11] Paper1186.pdf. https://ijarsct.co.in/Paper1186.pdf.
[12] Firkhan Ali Bin Hamid Ali. A study of technology in firewall system.
has been a very limited amount of research done on the In 2011 IEEE Symposium on Business, Engineering and Industrial
implementation of Distributed and other firewalls. A detailed Applications (ISBEIA), pages 232–236. IEEE, 2011.
review can be done to discuss various firewall policies and [13] Ricky Panchal. Firewalls: Hardware vs. soft-
ware. Dosegljivo: http://www4. ncsu. edu/˜ kksi-
access control list that can be used while writing a policy. vara/sfwr4c03/projects/4c03projects/RPanch al-Project. pdf [Dostopano
This will in turn be helpful for researchers and cybersecurity 25.10. 2015], 2005.
professionals in choosing the correct firewall according to the [14] Network security zones. https://www.kwtrain.com/blog/network-
security-zones: :text=A
user requirements. An extensive research is needed in this field
[15] E Eugene Schultz. 83-10-41 types of firewalls. Internet: http://www.
in order to ensure no data is breached so that an effective and ittoday. info/AIMS/DSM/83-10-41. pdf,[Nov. 5, 2014], 2021.
safe environment is developed for user communication through [16] HAO WANG. Network firewall. 2004.
the internet. Going forward, there is a need to enhance the [17] Gerhard Cronje. Choosing the best firewall. GIAC level one security,
2001.
effectiveness of cyber security in general though research and [18] Ido Dubrawsky. Firewall evolution-deep packet inspection. Security
implementation of different firewalls. Focus, 29:21, 2003.
[19] Harri Lehmonen. Improving network security with watchguard utm
firewall. 2017.
V. C ONCLUSION [20] Vinit Agham. Unified threat management. International Research
Journal of Engineering and Technology, 3(4):32–36, 2016.
Firewall is a first line of security which inspects all the [21] Sotiris Ioannidis, Angelos D Keromytis, Steve M Bellovin, and
traffic going inside and outside a network. This paper presents Jonathan M Smith. Implementing a distributed firewall. In Proceedings
a comparative analysis of traditional and NGFW . It also of the 7th ACM conference on Computer and communications security,
pages 190–199, 2000.
elaborates the need and working of a basic firewall. The [22] J Lane Thames, Randal Abler, and David Keeling. A distributed firewall
review defines that next generation firewall blocks advanced and active response architecture providing preemptive protection. In
malware from entering a secure network. It supports deep Proceedings of the 46th Annual Southeast Regional Conference on XX,
pages 220–225, 2008.
inspection of packets and intrusion prevention as well.
[23] What is a distributed firewall? - network and security virtualization -
Introduction of NAT and PAT firewall has further helped in vmware. https://blogs.vmware.com
providing an extra security by protecting private IP addresses [24] What is distributed firewall? — barracuda networks.
and assigning single public IP address to an organization. https://www.barracuda.com/glossary/distributed-firewall.
[25] What is a distributed firewall? — fortinet. https://www.fortinet.com
This review has also discussed security zones and traffic [26] Anchit Bansal and Priyanka Goel. Simulation and analysis of network
flow in firewall. Inside, outside and DMZ security zones address translation (nat) & port address translation (pat) techniques. Int.
have been discussed where inside has the highest security Journal of Engineering Research and Application, 7(7):50–56, 2017.
[27] 11.ip masquerade and network address translation - linux network
level by default and outside has the lowest security level. We administrator’s guide, second edition [book]. https://www.oreilly.com
conclude that advancement in firewall will further promote [28] What is a nat firewall, how does it work and when do you need one?
secure zones and help in protection of important data for https://www.comparitech.com/blog/vpn-privacy/nat-firewall/: :text=A
[29] Next-generation firewall vs traditional firewall: What’s the difference
organizations. - aplikas. https://aplikas.com/next-generation-firewall-vs-traditional-
firewall
2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) 969
Authorized licensed use limited to: Mukesh Patel School of Technology & Engineering. Downloaded on October 15,2023 at 09:40:27 UTC from IEEE Xplore. Restrictions apply.