Implementation of Different Firewall Technologies: Advantages and Disadvantages

Verified

Added on  2023/06/04

|6
|2344
|50
AI Summary
This report explains the working mechanism of firewall technology and their limitations. It describes different types of firewall systems available in the market, including packet filtering, stateful-inspection, network address translation, application-based, and hybrid firewalls. The report also highlights the advantages and disadvantages of each type of firewall technology.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: FIREWALL TECHNOLOGIES
1
Title: Implementation different between various firewall technologies with their relative
advantages and disadvantages
Abstract
A firewall is defined as a security network
which provides a way to protect personal
computer networks and servers from
hackers. It is also used to reduce unwanted
traffic signals from a server and many
organizations install firewall software in
their peripheral devices because it
identifies malware and other attacks. This
report is describing different types of
firewall technique and their applications in
data security. It is identified that many
consumers use a simple password system
which can be easily detected by hackers
and this software protect user’s personal
information’s. Therefore, consumers
should ensure that they follow the proper
configuration process when they establish
a new computer network. The security of
data can be increased by using encryption
technique and cryptography process.
Keywords: Firewall, malware, password
system, computer networks, and
encryption.
1. Introduction
The information of an organization is a
very important key element and the rate of
cyber-attacks is growing very fast. To
improve the security of private data
information technology developed one
new approach which is called firewall
technology. In last five years, the use of
internet and mobile has increased by 50%
in turn increasing various security risks
and threats also increased such as data
breach, security and privacy issues and
DOS attack [1]. The main purpose of this
report is to understand the fundamental
concept of firewall technology and
different types of firewall. A firewall is
defined as a security process that contains
both hardware’s and software’s that
protect organization personal details like
login ID and data. It has the ability to
reduce unauthorized or unwanted signals
from private servers and firewall are
designed to protect the user's computer
networks and other peripheral devices [2].
This report is categorized into four parts,
for example, an overview of firewall
technologies, research methodologies,
advantages and disadvantages of the
firewall process, and results.
2. Background
Today, the rate of firewall software is
increasing very quickly because it is very
simple and easy process to detect any
malware or unauthentic signals.
Information and communication
technology established two technologies to
avoid cyber-attack such as firewall and
intrusion [3]. Intrusion detection is a new
approach in the field of computer science
and with the help of this process
consumers can identify types of attacks
and they can secure their personal
information. There are many types of
firewall technologies developed which are
described below:
Packet filtering firewall

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Running Head: FIREWALL TECHNOLOGIES
2
Stateful -inspection firewall
Network address translation
firewall
Application based firewall
Hybrid firewall
2.1 Packet filtering firewall
It is the most common type of firewall
technology and it provides a platform to
control and monitor host networks. It is
also called as stateless inspection process
because it does not keep track of every
state of the process [4]. The main
drawback of this technology is that it
cannot handle multiple requests at a time
in a single session. It is observed that
numbers of users and organization are
purchased stateless packet filtering to
reduce security risks. In this technology
access control system is provided by third-
party sellers and it has the capability to
work in an operating system and it can be
used for routing process [5].
Advantages of packet filtering firewall
It is very less expansive
Low-cost process
Use low resources
Best suitable for small network and
servers
Disadvantages of packet filtering
firewall
It can work only on the layer of the
network device
It does not support complex models
Security and privacy issues
2.2 Stateful Inspection firewall
It is an advanced technology of packet
filter and it can track the state and situation
of every network. The main drawback of a
packet filter firewall is that it cannot
provide complete detail about each state by
which data can be lost at any stage. The
information of state table varies according
to the firewall product and it involves the
IP address of network, destination,
numbers of ports and state signals [6].
There are main three important states use
for any TCP network, for example,
termination, connection establishment, and
usage. This type of firewall technology is
used by many organizations to monitor and
control the state of every data links. If any
consumer uses this process then it will
identify that the given packet is a part of
the developed connection or not.
Advantages of stateful inspection
It can be utilized as a primary
network
This process can be used routers
Dynamic in nature
Reduce DOS and DDOS attacks
Disadvantages of stateful inspection
Need a lot of memory to store data
and track connections
Very complex and expansive
process
It is very limited technology
Less secure [7].
2.3 Application Firewalls
It is also called a proxy server and in
which the consumer communicate with
gateway with the help of TCP application.
When any customer provides their identity
and private information then this gateway
communicate with network hosts [8]. The
main purpose of this firewall technology is
to provide information about the
application and how an application is
working on a computer network. It has the
ability to identify unexpected signals and
unwanted traffic singles transferred by an
attacker.
Document Page
Running Head: FIREWALL TECHNOLOGIES
3
Advantages of the application firewall
Can be used as a protected method
for computer networks
Easy to understand
Automated Temporary Patches
Protection against Zero-day
Exploits
Stops Data Leakage
Disadvantages of an application firewall
It does not protect against cyber-
attacks
Require separate program per
application
More complex
Take more time
2.4 Hybrid firewall
It is a combination of both functions and
feature and it is more secure technology
which can detect unauthorized servers. It is
also called as pocket filtering process
which is used to combine the proxy
firewall with a circuit gateway. This type
of method can be used to control the data
portion of any packets and it has the
capability to identify traffic signals from
computer server [8].
Advantages of hybrid firewall
It provides anonymity to the
personal networks
Less expansive
Low-cost process
Disadvantages of hybrid firewall
It does not filter data packets
Require more time for
implementation
Cannot be used for large computer
network [7].
3. Comparison of firewall
technologies
There are many differences between firewall
technologies which can be understood from
following table:
Figure: the difference between various
firewall technologies
(Source: Gupta, Saikia and Sanghi, 2007)
4. Research Methods
The research method included different
types of strategies and process to
understand the concept of firewall
technology [9]. There are numbers of
research methods used in this research
report, for example, design, approach, data
collection process, and philosophy of the
exploration. The main objective of these
methods is to gather knowledge about
types of firewall technology and search
strategies can improve the effectiveness of
the research.
Document Page
Running Head: FIREWALL TECHNOLOGIES
4
4.1 Research design
In this research mixed research design is
used to understand the working of firewall
technology. A mixed method is defined as
a combination of both qualitative and
quantitative data analysis. In qualitative
research data or information is composed
of various articles and journal papers in
order to realize views of writers on the
topic of various firewall technologies.
4.2 Research Strategy
In this research, paper data is collected
with the help of survey and from different
articles published by authors. This research
design provides a platform to collect data
or information about firewall security and
all these information written by using
Microsoft and excel software’s [10]. In
which a literature review is produced to
realize working of firewall and it involved
various secondary resources and all
information are completely based on
researcher topic. With the help of both this
method research was able to explain the
advantages and disadvantages of firewall
technique.
4.3 Data collection method
In this research data is collected with the
help of a secondary type of analysis
method and in relevant data or information
is gathered from different sources, books,
websites, and other resources [11].
Therefore, research used this process to
describe different types of firewall
technologies and their strength and
weakness.
4.4 Sampling procedure
In this research, the writer used a sampling
process and random data sampling is used
to recognize the difference between
firewall technologies. The method of non-
probability sampling system avoided by
the investigator at the time of the research
to certify that biases did not outcome in
influencing the conclusion of the research.
5. Results
Security of data is the very important
aspect for any organization and firewall is
a process to reduce security threats and
risk. From this research, it is founded that
cyber-attacks and security issues can be
reduced by adopting firewall software and
antivirus. The researcher explained
different types of firewall technologies and
working principle of these security
systems [12]. It is observed that the packet
filtering firewall cannot be used for large
computer networks because it is not much
stable technology. To reduce the weakness
of the packet filtering process a new model
was developed by information security
which is known as stateful inspiration
method.
6. Conclusion
Firewall refers as a security process which
is used to detect unwanted signals and
malware from computer networks. In this
modern generation, many customers use a
computer and other peripheral devices to
communicate with other and they faced
many security issues due to lack of
security. This report is explained the
working mechanism of firewall technology
and their limitation. There are various
kinds of firewall system available in the
market, for example, Packet filtering
firewall, Stateful -inspection firewall,
Network address translation firewall,
Application-based firewall, and Hybrid
firewall which are described in this report.
Therefore, consumers should adopt a
firewall and other security plans like

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Running Head: FIREWALL TECHNOLOGIES
5
encryption, and cryptography technologies
to reduced cyber-attacks and malware
attack.
Document Page
Running Head: FIREWALL TECHNOLOGIES
6
7. References
1. K., Balasubramanian. “Web Application
Vulnerabilities and Their
Countermeasures.” In Application
Development and Design: Concepts,
Methodologies, Tools, and Applications,
22(6), pp. 1312-1342, 2018.
2. C. Basile and A., Lioy. “Analysis of
application-layer filtering policies with
application to HTTP.” IEEE/ACM
Transactions on Networking (TON), 23(1),
pp.28-41, 2015.
3. N., Gupta, A. Saikia and D., Sanghi.
“Web application firewall.” Indian
Institute of Technology, Kanpur, 61, p.62,
2007.
4. X., He, T., Chomsiri, P. Nanda and, Z.,
Tan. “Improving cloud network security
using the Tree-Rule firewall.” Future
generation computer systems, 30, pp.116-
126, 2014.
5. N., Jiang, H., Lin, Z. Yin and, C., Xi,
“Research of paired industrial firewalls in
the defense-in-depth architecture of
integrated manufacturing or production
system.” In Information and Automation
(ICIA), 2017 IEEE International
Conference on, 6(2), pp. 523-526, 2017,
2017.
6. T., Kaur, V. Malhotra and, D., Singh.
“Comparison of network security tools-
firewall, intrusion detection system, and
Honeypot.” Int. J. Enhanced Res. Sci.
Technol. Eng, 8(2), pp.200-204, 2014.
7. W. Koch and, A., Bestavros, “S3B:
Software-Defined Secure Server
Bindings.” In 2018 IEEE 38th
International Conference on Distributed
Computing Systems (ICDCS), 8(4), pp.
434-444, 2018.
8. T. Parrott and, T., Kraus. “Louisville
One Water: Working to Become an
Integrated Utility of the
Future.” Proceedings of the Water
Environment Federation, 2016(13),
pp.2943-2947, 2016.
9. S.H., Pawar. “A Study on Big Data
Security and Data Storage
Infrastructure. International Journal, 6(7),
p. 20, 2016.
10. S., Prandl, M. Lazarescu and, D.S.,
Pham. “A study of web application
firewall solutions.” In International
Conference on Information Systems
Security, 8(2), pp. 501-510, 2015.
11. G.B. Satrya and, S.Y., Shin.
“Optimizing rule on open source firewall
using content and pcre
combination.” Journal of Advances in
Computer Networks, 3(3), pp.308-314,
2015.
12. H., Zare, P., Olsen, M.J. Zare and, M.,
Azadi. “Operating System Security
Management and Ease of Implementation
(Passwords, Firewalls, and Antivirus).”
In Information Technology-New
Generations, 14(7), pp. 749-755, 2018.
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]