logo

Implementation of Different Firewall Technologies: Advantages and Disadvantages

Carrying out a mini-project on a chosen topic related to network security principles and writing an investigative report about it.

6 Pages2344 Words50 Views
   

Added on  2023-06-04

About This Document

This report explains the working mechanism of firewall technology and their limitations. It describes different types of firewall systems available in the market, including packet filtering, stateful-inspection, network address translation, application-based, and hybrid firewalls. The report also highlights the advantages and disadvantages of each type of firewall technology.

Implementation of Different Firewall Technologies: Advantages and Disadvantages

Carrying out a mini-project on a chosen topic related to network security principles and writing an investigative report about it.

   Added on 2023-06-04

ShareRelated Documents
Running Head: FIREWALL TECHNOLOGIES
1
Title: Implementation different between various firewall technologies with their relative
advantages and disadvantages
Abstract
A firewall is defined as a security network
which provides a way to protect personal
computer networks and servers from
hackers. It is also used to reduce unwanted
traffic signals from a server and many
organizations install firewall software in
their peripheral devices because it
identifies malware and other attacks. This
report is describing different types of
firewall technique and their applications in
data security. It is identified that many
consumers use a simple password system
which can be easily detected by hackers
and this software protect user’s personal
information’s. Therefore, consumers
should ensure that they follow the proper
configuration process when they establish
a new computer network. The security of
data can be increased by using encryption
technique and cryptography process.
Keywords: Firewall, malware, password
system, computer networks, and
encryption.
1. Introduction
The information of an organization is a
very important key element and the rate of
cyber-attacks is growing very fast. To
improve the security of private data
information technology developed one
new approach which is called firewall
technology. In last five years, the use of
internet and mobile has increased by 50%
in turn increasing various security risks
and threats also increased such as data
breach, security and privacy issues and
DOS attack [1]. The main purpose of this
report is to understand the fundamental
concept of firewall technology and
different types of firewall. A firewall is
defined as a security process that contains
both hardware’s and software’s that
protect organization personal details like
login ID and data. It has the ability to
reduce unauthorized or unwanted signals
from private servers and firewall are
designed to protect the user's computer
networks and other peripheral devices [2].
This report is categorized into four parts,
for example, an overview of firewall
technologies, research methodologies,
advantages and disadvantages of the
firewall process, and results.
2. Background
Today, the rate of firewall software is
increasing very quickly because it is very
simple and easy process to detect any
malware or unauthentic signals.
Information and communication
technology established two technologies to
avoid cyber-attack such as firewall and
intrusion [3]. Intrusion detection is a new
approach in the field of computer science
and with the help of this process
consumers can identify types of attacks
and they can secure their personal
information. There are many types of
firewall technologies developed which are
described below:
Packet filtering firewall
Implementation of Different Firewall Technologies: Advantages and Disadvantages_1
Running Head: FIREWALL TECHNOLOGIES
2
Stateful -inspection firewall
Network address translation
firewall
Application based firewall
Hybrid firewall
2.1 Packet filtering firewall
It is the most common type of firewall
technology and it provides a platform to
control and monitor host networks. It is
also called as stateless inspection process
because it does not keep track of every
state of the process [4]. The main
drawback of this technology is that it
cannot handle multiple requests at a time
in a single session. It is observed that
numbers of users and organization are
purchased stateless packet filtering to
reduce security risks. In this technology
access control system is provided by third-
party sellers and it has the capability to
work in an operating system and it can be
used for routing process [5].
Advantages of packet filtering firewall
It is very less expansive
Low-cost process
Use low resources
Best suitable for small network and
servers
Disadvantages of packet filtering
firewall
It can work only on the layer of the
network device
It does not support complex models
Security and privacy issues
2.2 Stateful Inspection firewall
It is an advanced technology of packet
filter and it can track the state and situation
of every network. The main drawback of a
packet filter firewall is that it cannot
provide complete detail about each state by
which data can be lost at any stage. The
information of state table varies according
to the firewall product and it involves the
IP address of network, destination,
numbers of ports and state signals [6].
There are main three important states use
for any TCP network, for example,
termination, connection establishment, and
usage. This type of firewall technology is
used by many organizations to monitor and
control the state of every data links. If any
consumer uses this process then it will
identify that the given packet is a part of
the developed connection or not.
Advantages of stateful inspection
It can be utilized as a primary
network
This process can be used routers
Dynamic in nature
Reduce DOS and DDOS attacks
Disadvantages of stateful inspection
Need a lot of memory to store data
and track connections
Very complex and expansive
process
It is very limited technology
Less secure [7].
2.3 Application Firewalls
It is also called a proxy server and in
which the consumer communicate with
gateway with the help of TCP application.
When any customer provides their identity
and private information then this gateway
communicate with network hosts [8]. The
main purpose of this firewall technology is
to provide information about the
application and how an application is
working on a computer network. It has the
ability to identify unexpected signals and
unwanted traffic singles transferred by an
attacker.
Implementation of Different Firewall Technologies: Advantages and Disadvantages_2
Running Head: FIREWALL TECHNOLOGIES
3
Advantages of the application firewall
Can be used as a protected method
for computer networks
Easy to understand
Automated Temporary Patches
Protection against Zero-day
Exploits
Stops Data Leakage
Disadvantages of an application firewall
It does not protect against cyber-
attacks
Require separate program per
application
More complex
Take more time
2.4 Hybrid firewall
It is a combination of both functions and
feature and it is more secure technology
which can detect unauthorized servers. It is
also called as pocket filtering process
which is used to combine the proxy
firewall with a circuit gateway. This type
of method can be used to control the data
portion of any packets and it has the
capability to identify traffic signals from
computer server [8].
Advantages of hybrid firewall
It provides anonymity to the
personal networks
Less expansive
Low-cost process
Disadvantages of hybrid firewall
It does not filter data packets
Require more time for
implementation
Cannot be used for large computer
network [7].
3. Comparison of firewall
technologies
There are many differences between firewall
technologies which can be understood from
following table:
Figure: the difference between various
firewall technologies
(Source: Gupta, Saikia and Sanghi, 2007)
4. Research Methods
The research method included different
types of strategies and process to
understand the concept of firewall
technology [9]. There are numbers of
research methods used in this research
report, for example, design, approach, data
collection process, and philosophy of the
exploration. The main objective of these
methods is to gather knowledge about
types of firewall technology and search
strategies can improve the effectiveness of
the research.
Implementation of Different Firewall Technologies: Advantages and Disadvantages_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Methods to Address Cybersecurity Issues in JL Organization
|13
|2416
|109

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Foundation of Cyber Security
|6
|1679
|89

Cyber Security Assignment PDF
|9
|2867
|2114

Healthcare Networks: Architecture, Security Threats and Solutions
|7
|338
|124

Overview of Network Security
|8
|2332
|431