Osy Project 2
Osy Project 2
1.0) Rationale:-
The internet is full of potential threats, including hackers, malware, and other
malicious actors seeking to gain unauthorized access to systems and data.
Firewalls act as a barrier between a trusted network and the untrusted internet,
preventing unauthorized access to sensitive information.
Malware, such as viruses, worms, trojans, and spyware, can infect computers and
networks through various means, including email attachments and malicious
websites. Firewalls can filter incoming and outgoing traffic to block known
malware and prevent it from reaching its target
• Network Segmentation:
Firewalls can be used to segment a network into different security zones, creating
compartments that can limit the spread of threats. This is crucial for protecting
sensitive data and ensuring that even if one part of the network is compromised,
the rest remains secure.
1
3.0) Literature Review:-
Researchers have traced the evolution of firewalls from their early packet-filtering days
to more sophisticated stateful and application-layer firewalls. They have explored how
firewalls have adapted to address emerging threats and changing network architectures.
• Firewall Effectiveness:
Research highlights the integration of intrusion detection and prevention features into
firewalls. This combination enhances network security by not only blocking
unauthorized access but also identifying and responding to potential threats within the
network.
2
With the adoption of cloud services, there is growing interest in cloud-based firewalls.
Literature reviews the advantages of cloud-based firewalls, including scalability and
the ability to protect distributed networks.
Some studies investigate user-centric firewall models, where security policies are
applied based on user identities rather than just IP addresses. This approach enhances
security while accommodating remote work and mobile device usage
Packet filtering firewalls operate at the network layer (Layer 3) and filter traffic based on
predefined rules, such as source and destination IP addresses, port numbers, and protocols.
They make decisions on whether to allow or block packets based on these rules. Packet
filtering firewalls are typically the most basic type of firewall.
Stateful inspection firewalls, also known as dynamic packet filtering firewalls, monitor the
state of active connections and make decisions based on the state of the connection. This
3
allows them to make more intelligent filtering decisions and provide enhanced security
compared to packet filtering firewalls.
Proxy firewalls operate at the application layer (Layer 7) of the OSI model. They act as
intermediaries between the client and the server, intercepting and inspecting network
traffic. This allows them to filter and modify data at the application level, providing more
granular control over traffic. Proxy firewalls are often used for content filtering,
authentication, and deep packet inspection.
• Circuit-Level Gateways:
Circuit-level gateways work at the transport layer (Layer 4) and operate by verifying the
TCP handshake of network connections. They don't inspect the content of packets but
ensure that the connection is legitimate. Circuit-level gateways are commonly used for
creating Virtual Private Networks (VPNs).
ALGs are designed to work with specific applications or services. They understand the
protocols of the applications they are designed for and can inspect and filter traffic based
on the application's requirements. This type of firewall is often used for FTP, VoIP, and
other specialized services.
• Cloud Firewalls:
Cloud-based firewalls are deployed in the cloud and are designed to protect cloud-based
infrastructure and applications. They offer scalability, flexibility, and centralized
management for cloud environments.
4
4.0) Actual Methodology Followed:-
2. Software 1
5
6.0) Code Outputs of the Micro-Project:-
6
7
7.0) Skill Developed/ Learning Outcomes of Micro-Project:-
Students will be able to explain the concepts, types, and architectural components of
firewalls, and understand their role in network security.
Students will learn how to configure, manage, and troubleshoot firewall systems,
including rule sets, access control lists, and policies.
Students will be able to identify and describe common network threats and attacks, such as
malware, DDoS attacks, phishing, and intrusion attempts.
Students will understand the principles of intrusion detection and prevention systems
(IDPS) and their integration with firewalls for proactive threat mitigation.
Students will be capable of developing and implementing security policies that govern
firewall rules, access controls, and network security practices within an organization.
8
• Next-Generation Firewalls (NGFWs):
Students will learn about the advanced features and capabilities of NGFWs, including
application awareness, deep packet inspection, and threat intelligence integration.
• Network security
• Access control
• Malware and virus protection
• Content filtering
• Intrusion detection and prevention
• Virtual private networks
• Application control
• DDos Mitigation
• Network segmentation
• Policy inforcement • Cloud security
• End-point security
9
9.0) Area of Future Improvement:-
The future improvement of firewalls will be driven by the evolving threat landscape,
emerging technologies, and the need for more robust and adaptable security solutions. Here
are some areas where firewalls are likely to see improvements in the future:
10) Referance
10