Firewall/IDS Security Research Paper for CO4510 - Advanced IT Security

Verified

Added on  2022/09/12

|4
|3474
|42
Report
AI Summary
This research paper explores the crucial aspects of firewall and intrusion detection system (IDS) security in the context of IT security. The paper begins with an abstract summarizing the research, followed by an introduction that highlights the significance of cybersecurity in the face of increasing cyber attacks. The discussion section delves into the functionality of firewalls, including their architecture, advantages, and various types such as hardware, software, packet filter, proxy, application gateway, circuit level gateway, and stateful packet inspection firewalls. The paper also examines IDS, its types (NIDS, HIDS, PIDS, VIDS), and their differences from firewalls. The paper discusses the current practices, advantages and disadvantages of both technologies. The research paper covers topics like cyber attacks, cyber protection, malicious activities, network traffic monitoring, unauthorized system prevention, and intrusion detection. The paper concludes with a discussion of potential improvements and future directions in firewall and IDS security.
Document Page
Firewall/IDS Security
1st Author
1st author's affiliation
1st line of address
2nd line of address
Telephone number, incl. country code
1st author's E-mail address
2nd Author
2nd author's affiliation
1st line of address
2nd line of address
Telephone number, incl. country code
2nd E-mail
3rd Author
3rd author's affiliation
1st line of address
2nd line of address
Telephone number, incl. country code
3rd E-mail
ABSTRACT
There are various types of attacks that have to be faced between
the aim amounts of assignment completion. That is why it can
be stated that the aim amount of security can be saved properly
to make the systems secured. Various organizations and personal
usage computers should be managed properly to get the
assignment done. The firewall and the IDs technology are the
main of them. Both are heavily used nowadays in various
situation. That is why it can be stated that both protections
research will be done to achieve the research properly to get the
assignment done.
General Terms
Security
Cyber Attacks
Cyber protection
Firewall
IDS
Keywords
Policies, Attacks, malicious,
1. INTRODUCTION
The cyber-attack is one of the biggest problems for
each and every organizations nowadays. There is various attack
procedure that can hack the system in such a way, that all of the
data will be lost. That is why it can be concluded that the proper
protection is needed to save the personal system as well as the
organizations. Various processes have to be maintained properly
to get the solution done by saving the situation appropriately.
There is the various way and the process can be followed to
make the system secured from the hackers. The intrusion
detection system and the firewall are main of them. They will
properly control the bypass and layered security. The firewall is
generally used for monitoring the network traffic which will
help to prevent the unauthorized system properly in the network
system[1]. The intrusion detection system also helps to filter
malicious activity in the network system. In this following
research, the proper specification, research, improvement and
the current practices will be addressed appropriately[2].
2. DISCUSSION
The firewall is the main device which can be
placed on the internal network of the organizations.
The information will be divided into various packets,
which will be transferred to finish the situation
properly[12]. The firewall should properly monitor
that information. So the suspicious host will be
detected and blocked by the firewall easily. Nowadays
the windows defender with the firewall mechanism is
hugely protected to protect the system properly to get
the solution done. The firewall installation is
necessary nowadays. The network level and the router
will be blocked to maintain the system properly to get
the solution done. The destination should be
maintained properly to get the security done with the
procedure of the assignment completion for getting the
situation done. Few points need to be noted to finish
the procedure of the firewall architecture. The criteria
based networking will be helpful in the layer of the
destination and the port combination. The network
layer will be helpful to finish the procedure of the
assignment properly to get the assignment done. One
type to another type of criteria should be maintained
by the firewall properly. The application data
problems will be solved through the protection of the
firewall. The firewall is the strong procedure if the
assignment will be maintained with the balance of the
loosely coupled and strictly coupled. If the entire
communication will be allowed in the firewall, then it
will be easily hacked. There are various advantages
can be specified for using the firewall[11]. The
functionality can be modified, also the security policy
can be modified according to the organization; both of
them are a huge plus point for the firewall. Pop and
SNMP are the main emailing protection which can be
specified by their technology.
In the other hand, it can be stated that the
Intrusion detection system will be helpful to protect
the system from the unauthorized system. The ID
system gathering will be helpful to finish the
procedure of the defence properly to get the possible
security breaches from the various attacks. Mainly the
Intrusion detection system will easily detect the
suspicious pattern which will help to protect the
system properly. In the file handling system intrusion
will be helpful to manage the various aspect. In the
system instruction valid user problem, unused login,
non-working time login, the new account created
automatically, system log detection, configure the
system software, system log detection, performance
decrees situation, unusual display, system crash should
be maintained to make the assignment done. Except
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
for this problem file intrusion like unknown file
identification, file permission modification, missing
file problem can be solved through this procedure. In
the other hand, the network intrusion can be used for
log data research, repeated probes, increase of
bandwidth consumption and repeated attacks by
hacker situation[3]. So it can be stated that the various
detection can be done through the Intrusion detection
system[13].
The current practices will be done with the
various type of Intrusion detection system and firewall
system, which will address the specific purposes
adequately. There are mainly seven types of firewall is
used to protect the system and network properly.
Those are: Hardware Firewall-The physical network
firewall should be maintained properly to get the
solution done with the help of the assignment
completion. One compromise situation of this firewall
system will be denoted as the weak firewall in this
situation. The machines might be treated as a
vulnerable attack then. Software Firewall- It is a
second layer protocol used to save the system from the
virus and malware[15]. The email attachments attacks
should be taken care of this system to make the
situation better. The antivirus programs should be
managed properly to get the solution done with the
specific situation of the assignment completion.
Packet filter firewall-The communicational filtering
will be done through this process properly to make the
system better. It can be also attached with the filtering
table which can be calculated properly to get the
solution done. The filtering facility can be done
properly to get the solution done with the process of
assignment completion. The IP address, TCP and the
UDP source destination should be managed properly to
get the assignment done. The proper information
should maintain proxy Firewall-Proxy firewall with
the network and transport layer which is needed to be
used in the network system. Filter messaging should
be maintained properly to get the solution done.
Different pack problems will also be solved with the
TCP port 80 in this proxy procedure. Server opening
will be concluded properly to get the assignment done.
Proxy firewall can also be modified by the user, real
server situation can be maintained for the real sever
identification in this matter. Application Gateway-
The application gateway should be maintained
properly to make the system fluent. The HTTP, FTP,
Telnet should be managed with this procedure in the
data functionality. FTP commands will help to modify
the application gateway to finish the situations
properly. Slower performance, transparency laciness,
proxy problems and the limit application problems
should be maintained properly to get the solution
done[6]. Circuit level gateway-The session layer
protection will be done by this category. The trusted
data protection will be done through the process of the
work in such a way, the client-server problem will be
solved properly. Stateful Packet Inspection- the
ACK, SYN and the sessional assignment completion
will be done properly to get the solution done[14].
In the other hand, the IDS have the four subdivision
according to the nature of the protection. NIDS:
Multiple host monitoring and the network tariffing can
be maintained or monitored through this process. Port
monitoring is one of the advantages of this procedure.
In the demilitarized zone, this protection will be
applied properly to get perfect protection[10]. HIDS:
File system modification will be done through this
procedure. OSSEC is one of the best examples of this
procedure. The famous honeypot protection will be
done through this procedure. PIDS: It is used in the
optical fibre networking system to detect the pinpoint
location to solve the situation. VIDS: Virtual machine
monitoring will be done in the intrusion detection
process to finish the overall activities[19].
Though the network should be managed properly to
prevent the attacks, both have some little difference to
solve the situation. The hardware and the software
functions should be managed properly to get the
assignment done, for preventing unauthorized
communication. In the other hand, the IDS will host
and detect the intrusion attempts to finish the
procedure of the work properly[4]. The firewall will be
denoted as the gate and the IDS is the camera of the
system. The intrusion detection and the prevention will
be done properly to get the assignment done as per the
completion of the assignment simulation. Some
procedures have to be done properly with the process
of the proper process which will detect and remove the
system properly. So moreover for proper detection and
the identification both are needed to finish the
procedure of the assignment properly. The assignment
completion will be done with the case situation which
is needed to be solved properly to get the assignment
done[16].
There are various advantage and
disadvantages are spotted which will critically specify
the critical factor properly[5].
The firewall is one of the best auditors which will help
plenty of Disk remote logging problem properly, all
traffic problem can be solved which will pass through
the situation. Moving data research is also done
through this procedure. Incoming and the outgoing
traffic will be specified properly through the system.
The access restoration will be done properly through
the firewall properly[20]. The SNMP and the POP will
help to finish the process of the assignment properly to
get the assignment done. So it can be used to finish the
firewall of the proper security in such a way that the
assignment should be managed to get the assignment
done. There is a procedure that has to be maintained to
get the assignment done, which will help to finish the
situation of the attack properly. There are various
processes that have to be managed properly which is
needed to be solved with the situation[17]. The
problem is the firewall cannot manage sensitive data
in social engineering. In the other hand, if the wrong
information has been marked as authorized, then it
will not detect. If the traffic will not pass through this
situation, then it will not detect the malicious
situation. The HTTP and the SMTP solution can be
Document Page
managed properly to get the assignment done with the
proper process of the completion. In the other hand,
the IDS attack should be maintained properly to get
the assignment done with the antivirus signature
process. The .Wav file indication is done of the main
process in this situation. The raw packets problems
can be solved through this properly. The intimation of
the process will also help to process the research
properly[20].
Various disadvantages have to be maintained
properly to get the assignment done for the procedure
of assignment completion. The intrusion procedure
should be more modified. Multiple intrusion detection
should be added to filter the situation properly. The
single process should be modified to make the system
better with the assignment finished properly. Various
processes of the source are needed to specify the
assignment properly, which will help to finish the
process properly[9]. The real-world productivity
should be done with the help of the assignment
finished properly. There is a procedure which can be
used to improve the firewall. Internal security should
be done properly to get the assignment done with the
proper situation of the processing. The VPN should be
locked properly, that is how the other attacks should
be prevented. The partner deterrent is the main fact
which should be maintained for the Internet-style
perimeters[18]. The track security should be
automatically checked to solve the situation properly.
The network access of the unused mask will be helpful
to finish the procedure properly. Unused services in
the network should be shut down. The critical resource
should be managed properly to get the assignment
done. The wireless access should be properly modified
with the completion of the assignment simulation. The
visitor access should be limited. There will be a huge
chance if the hacker will take action from the visitor
display. Virtual parameters should be created and the
security missions should be taken with the advance
protocol[8].
3. CONCLUSION
It can be concluded that the firewall and the
IDS both are essential for security. It can be stated that
the aim amount of assignment should be maintained
properly to get the assignment done, which will help to
finish the procedure properly with the assignment
completion. It can be stated that various processes
have to be maintained appropriately to finish the
situation of assignment completion. It can be stated
that the modification should be done properly to get
the best protection in the system. One of them is used
for monitoring purpose, another one is prevented. As
per the assignment compilation, there are several
advanced features are added to finish the situation
properly to get the assignment done. The research will
specify that if the organization will use the latest
firewall system, then it can be concluded that the
assignment completion will be done properly. There
are several processes and procedure which will help to
finish the protection procedure properly. There are
several processes that can also be used as the policy of
the company, which should be followed by assignment
completion. There is a procedure that has to be
managed properly to get the assignment done. That is
how the organisations or the personal user will assure
security through both of the processs[7]. Using the
firewall and IDS security will help to maintain the
system from several attacks. The easy attacks and
unauthorised access should be prevented appropriately
through this process.
4. REFERENCES
[1] Firewall and VPN Technology. (2017). International Journal
of Science and Research (IJSR), 6(12), pp.1762-1765.
[2] SinghArneja, P. and Sachdev, S. (2015). Detailed Research
of Antivirus based Firewall and Concept of Private Cloud
Antivirus based Firewall. International Journal of Computer
Applications, 111(4), pp.16-23.
[3] Hwang, D., Lee, B. and Yeom, D. (2013). Is the firewall
consistent? Gedanken experiments on black hole
complementarity and firewall proposal. Journal of Cosmology
and Astroparticle Physics, 2013(01), pp.005-005.
[4] Paper on Types of Firewall and Design Principles.
(2016). International Journal of Science and Research (IJSR),
5(5), pp.1583-1590.
[5]He, X., Chomsiri, T., Nanda, P. and Tan, Z. 2014. Improving
cloud network security using the Tree-Rule firewall. Future
Generation Computer Systems. 30, (2014), 116-126.
[6]Selvi, V., Sankar, R. and Umarani, R. 2014. The Design and
Implementation of On-Line Examination Using Firewall
security. IOSR Journal of Computer Engineering. 16, 6 (2014),
20-24.
[7] Son, S., Shin, S., Yegneswaran, V., Porras, P. and Gu, G.
2013. Model checking invariant security properties in
OpenFlow. 2013 IEEE International Conference on
Communications (ICC). (2013).
[8] Grammatikakis, M., Papadimitriou, K., Petrakis, P.,
Papagrigoriou, A., Kornaros, G., Christoforakis, I.,
Tomoutzoglou, O., Tsamis, G. and Coppola, M. 2015. Security
in MPSoCs: A NoC Firewall and an Evaluation
Framework. IEEE Transactions on Computer-Aided Design of
Integrated Circuits and Systems. 34, 8 (2015), 1344-1357.
[9] Kumar, G., Saha, R., Singh, M. and Rai, M. 2018. Optimized
Packet Filtering Honeypot with Snooping Agents in Intrusion
Detection System for WLAN. International Journal of
Information Security and Privacy. 12, 1 (2018), 53-62.
[10]Kodge B. G. 2017. Information Security: A Review on
Steganography with Cryptography for Secured Data
Transaction. International Journal of Scientific Research in
Network Security and Communication. 5, 6 (2017), 1-4.
[11]Liao, H., Richard Lin, C., Lin, Y. and Tung, K. 2013.
Intrusion detection system: A comprehensive review. Journal of
Network and Computer Applications. 36, 1 (2013), 16-24.
[12]Khonde, S. and Venugopal, U. 2019. Hybrid Architecture
for Distributed Intrusion Detection System. Ingénierie des
systèmes d information. 24, 1 (2019), 19-28.
Document Page
[13]Kang, M. and Kang, J. 2016. Intrusion Detection System
Using Deep Neural Network for In-Vehicle Network
Security. PLOS ONE. 11, 6 (2016), e0155781.
[14] Bhavsar, Y.B. and Waghmare, K.C., 2013. Intrusion
detection system using data mining technique: Support vector
machine. International Journal of Emerging Technology and
Advanced Engineering, 3(3), pp.581-586.
[15] Yang, Y., McLaughlin, K., Sezer, S., Littler, T., Im, E.G.,
Pranggono, B. and Wang, H.F., 2014. Multiattribute SCADA-
specific intrusion detection system for power networks. IEEE
Transactions on Power Delivery, 29(3), pp.1092-1102.
[16] Pan, S., Morris, T. and Adhikari, U., 2015. Developing a
hybrid intrusion detection system using data mining for power
systems. IEEE Transactions on Smart Grid, 6(6), pp.3104-3113.
[17] Fadlullah, Z.M., Nishiyama, H., Kato, N. and Fouda, M.M.,
2013. Intrusion detection system (IDS) for combating attacks
against cognitive radio networks. IEEE network, 27(3), pp.51-
56.
[18] Nikolai, J. and Yong Wang 2014. Hypervisor-based cloud
intrusion detection system. 2014 International Conference on
Computing, Networking and Communications (ICNC). (2014).
[19] Tan, Z., Nagar, U., He, X., Nanda, P., Liu, R., Wang, S.
and Hu, J. 2014. Enhancing Big Data Security with
Collaborative Intrusion Detection. IEEE Cloud Computing. 1, 3
(2014), 27-33.
[20] Khamphakdee, N., Benjamas, N. and Saiyod, S. 2014.
Improving Intrusion Detection System based on Snort rules for
network probe attack detection. 2014 2nd International
Conference on Information and Communication Technology
(ICoICT). (2014).
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]