Prject
Prject
Implementation
Sohila Ashraf, Rokaia Emad
December 25, 2023
Abstract: With the advancement of technology and network applications, protecting your information
on the network has become increasingly critical, resulting in the development of several defensive tools.
However, the focus of this paper is on firewalls. Since the first time they were introduced, firewalls have
evolved. They progressed from simple (like a packet-filtering firewall) to complicated and advanced (like
Next Generation firewalls, which this paper focuses on). NGFWs have a highly effective tool set that allows
them to detect (by integration with threat intelligence feeds and SSL inspection and decryption) and respond
to nearly any threat (via DPI and IPS). Before utilizing NGFW, you should consider various factors such as
privacy concerns, overall network performance impact, and the complexity of using it in large organizations
or groups. This paper seeks to provide a deep understanding of firewall evolution, an understanding of some
NGFW features, and the considerations involved in NGFW implementation.
1 Introduction
The rapid development of technology, which enables communication and the exchange of data, has numerous
negative impacts, including the rise in cybercrime, which involves online attacks and data theft. Therefore,
protecting data from harm or unauthorized use is of utmost importance. Thus, a firewall is a system that
filters and protects network traffic from assaults by applying access control policies to it. It functions as a
gate to filter and determine whether a packet is accepted or refused. The Next Generation Firewall (NGFW)
is a type of firewall that is used to provide high protection and security by detecting and blocking dangerous
attacks. This paper highlights the development of firewalls until the Next Generation Firewall (NGFW), the
features of the Next Generation Firewall (NGFW), and Challenges and considerations.
2 Evaluation of firewalls
Since firewalls play a crucial role in network security, different types of firewalls have been introduced and
developed. According to (Mukkamala Rajendran, 2020), the most basic and oldest firewalls are Packet-
Filtering Firewalls: which construct checkpoints at network nodes and filter traffic using specified rules on IP
addresses, port numbers, and other packet information. Since they do not inspect packet contents, they are
inefficient against modern attacks. In a similar vein, Circuit-level gateways uses TCP handshakes to allow
or deny traffic, but it does not inspect packet content, making it ineffective against malware. Combining
the previously discussed technologies, Stateful Inspection Firewalls, which make it more computationally
complicated. They maintain session tables to track the state of connections; however, they are susceptible to
DoS attacks and may slow down package transfer rates. Performance can be improved by using optimization
techniques such as splay tree firewalls. Application-Level Gateways, these firewalls operate at the application
level, examining packet contents, TCP handshake protocols, and checking for malware in the packet content.
By doing so and providing anonymity, they provide more protection than Stateful Inspection Firewalls, but
they can slow down the transfer of data due to the additional security procedures. Next-Generation Firewalls
are the most modern and advanced firewalls. It combines Deep packet inspection, Intrusion Prevention
System, bandwidth management, URL filtering Antivirus, antivirus, malware detection, and older packet
1
filtering and TCP handshakes. They are effective against modern threats. Therefore, Next-generation
firewalls provide more granular control than older firewalls, making them more widely used.
3 Features of NGFW
Next-Generation Firewalls (NGFWs) offer advanced security capabilities to protect networks from a wide
range of threats. Operating at high speeds, (Ghosh Senthilrajan, 2019) claim that Deep Packet Inspection
(DPI) examines packet content and headers in the application layer of the OSI model. This deep inspection
capability makes DPI more secure than traditional methods. By identifying packet content and IDs, DPI
enables tasks like intrusion detection, virus scanning, and content filtering. DPI uses three methods—Port
Detection, Signature Detection, and Heuristics Detection—to identify protocols and applications, thereby
enhancing its security. As cited in (Islam et al., 2023), Intrusion Prevention Systems (IPS) complement
NGFWs by not only detecting attacks but also responding automatically to them. IPS can take counter-
measures such as logging off users, killing processes, shutting down systems, or dropping connections in
response to detected threats, providing a proactive defense mechanism. Another crucial feature, Application
Awareness and Control (AAC), inspects both packet content and headers. Unlike DPI, AAC focuses on
identifying the specific applications generating network traffic. This granular control allows administrators
to define policies based on application types, users, and groups. As a result, they can allow or block spe-
cific applications and apply varying security criteria based on application usage. Also, (Griffioen et al.,
2020) state that Integration with threat intelligence feeds empowers NGFWs with real-time insights into
recent threats and indicators such as domain names or IP addresses. This integration enables automated
responses to detected threats, enhancing the NGFW’s ability to adapt to evolving security threats. Further-
more,(Korhonen, 2019) states that SSL inspection and decryption capabilities address the challenge posed
by encrypted network traffic. NGFWs with SSL inspection and decryption can decrypt SSL/TLS-encrypted
traffic, allowing for thorough inspection. This includes mechanisms like behavioral analysis, signature-based
detection, and threat intelligence feeds. This additional layer of security ensures that encrypted traffic is not
a blind spot for network security, further strengthening the NGFW’s defenses against sophisticated threats.
5 Discussion
5.1 Results
The outcome of this paper demonstrates that Next-Generation Firewalls (NGFWs) are very effective against
every threat. According to finding, what makes Next-Generation Firewalls (NGFWs) very effective is the set
2
of tools it has (especially DPI). Reviewed sources emphasize that the complete features of Next-Generation
Firewalls (NGFWs) can make the communication network safe.
5.2 Limitations
The sources have limitation in showing functioning of Next-Generation Firewalls (NGFWs) and most of
sources are outdated. Similarly, there are few materials that completely explain the advantages and dis-
advantages of NGFWs. Given these constraints, this research will concentrate on three main areas: the
evolution of firewalls leading up to NGFWs, the unique features that distinguish NGFWs, and the critical
factors that organizations should keep in mind while using NGFW technology.
5.3 Recommendations
In the future, it would be better to investigate the drawbacks of NGFWs. Furthermore, detailed insight into
NGFW functionality would be preferred, as would updating NGFWs so that they are constantly effective,
as this is becoming essential.
6 Conclusion
Firewalls play a crucial role in securing data and protecting networks from cyber threats. Over time,
firewalls have evolved from traditional models to Next-Generation Firewalls (NGFWs) to provide more
advanced security measures and higher levels of protection. NGFWs offer a wide range of features, including
Deep Packet Inspection (DPI), Intrusion Prevention Systems (IPS), Application Awareness and Control
(AAC), integration with threat intelligence feeds, and SSL inspection and decryption capabilities. These
features enable NGFWs to enhance security by enabling detailed inspection of network traffic, proactive
threat detection and prevention, granular control over applications, and real-time response to emerging
threats. However, the implementation of NGFWs is not without challenges and considerations. The use of
advanced detection techniques like DPI and SSL decryption can impact network performance due to their
high computational requirements. Managing network traffic and security policies using NGFWs can also
introduce complexity, especially in large organizations. Additionally, privacy concerns related to DPI need
to be carefully addressed to ensure compliance with regulations and protect sensitive data.
References
Mukkamala, P. P., Rajendran, S. (2020). A SURVEY ON THE DIFFERENT FIREWALL TECHNOLO-
GIES. International Journal of Engineering Applied Science and Technology, 5(1), 363–365.
https://doi.org/10.33564/ijeast.2020.v05i01.059
Griffioen, H., Booij, T. M., Doerr, C. (2020). Quality Evaluation of Cyber Threat Intelligence Feeds. In
Lecture Notes in Computer Science (pp. 277–296). https://doi.org/10.1007/978-3-030-57878-71 4
Ghosh, A., Senthilrajan, A. (2019). Classifying network traffic using DPI and DFI. International Journal
of Scientific Technology Research, 8(11), 3983–3988. https://www.ijstr.org/paper-references.php?ref=IJSTR-
1119-24579
Islam, S., Uddin, M. A., Ahmed, M. S., Moazzam, G. (2023). Analysis and evaluation of network and
application security based on next generation firewall. International Journal of Computing and Digital Sys-
tems, 13(1), 193–202. https://doi.org/10.12785/ijcds/130116
3
Erdheim, S. (2013). Deployment and management with next-generation firewalls. Network Security,
2013(10), 8–12. https://doi.org/10.1016/s1353-4858(13)70113-2