SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
 
Volume 2 Issue 9, September 2013
www.ijsr.net
Approach of Data Security in Local Network Using
Distributed Firewalls
1
J. Lavanya, 2
R. V. Krishnaiah
1
M. Tech in CSE from JNTUH, B. Tech (CSE) SVS Group of Institution, Warangal, India
2
PhD, M. Tech in CSE from JNTU Hyderabad, M. Tech in EIE from NIT, Warangal, India
Abstract: Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and
regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or
during the sensitive data transmission. Distributed firewalls allow enforcement of security policies on a network without restricting its
topology on an inside or outside point of view. Use of a policy language and centralized delegating its semantics to all members of the
networks domain support application of firewall technology for organizations, which network devices communicate over insecure
channels and still allow a logical separation of hosts in- and outside the trusted domain. We introduce the general concepts of such
distributed firewalls, its requirements and implications and introduce its suitability to common threats on the Internet, as well as give a
short discussion on contemporary implementations.
Keywords: Network Security, Security Policy, Pull technique, Push technique, Policy distribution
1. Introduction
Computers and Networking have become inseparable by
now. A number of confidential transactions occur every
second and today computers are used mostly for
transmission rather than processing of data. So Network
Security is needed to prevent hacking of data and to provide
authenticated data transfer. Network Security can be
achieved by Firewall. Conventional firewalls rely on the
notions of restricted topology and controlled entry points to
function. Restricting the network topology, difficulty in
filtering of certain protocols, End-to-End encryption
problems and few more problems lead to the evolution of
Distributed Firewalls [1].
A distributed firewall is a mechanism to enforce a network
domain security policy through the use of a policy language,
a policy distribution scheme enabling policy control from a
central point and certificates, enabling the identification of
any member of the network policy domain [1].
Distributed firewalls secure the network by protecting
critical network endpoints, exactly where hackers want to
penetrate. It filters traffic from both the Internet and the
internal network because the most destructive and costly
hacking attacks still originate from within the organization.
They provide virtually unlimited scalability. In addition,
they overcome the single point-of-failure problem presented
by the perimeter firewall [1].
Distributed firewalls are host-resident security software
applications that protect the enterprise network's servers and
end-user machines against unwanted intrusion. They offer
the advantage of filtering traffic from both the Internet and
the internal network. This enables them to prevent hacking
attacks that originate from both the Internet and the internal
network. This is important because the most costly and
destructive attacks still originate from within the
organization [1].
2. Issues of Convention Firewalls
A firewall is a collection of components, interposed between
two networks that filter traffic between them according to
some security policy.
Some problems with the conventional firewalls that lead to
Distributed Firewalls are as follows.
1.Depends on the topology of the network.
2.Do not protect networks from the internal attacks.
3.Unable to handle protocols like FTP and RealAudio.
4.Have single entry point and the failure of this leads to
problems.
5.Unable to stop "spoofed" transmissions (i.e., using false
source addresses).
6.Unable to log all of the network's activity and unable to
dynamically open and close their networking ports [1] .
3. Distributed Approach to Firewall Design
As a result of dramatic increase in network complexity and
development of new technologies like wireless networks and
VPNs, it is not easy to maintain a fixed network topology
anymore. Additionally, there are increasing user demands
like mobility, security, performance and reliability. As a
result of these and the disadvantages mentioned above,
conventional firewalls have started to become inadequate
[6].
In order to remove such kind of problems, Bellovin and
Ioannidis, et al. introduced the concept of distributed
firewall. The distributed firewall design is based on the idea
of enforcing the policy rules at the endpoints rather than a
single entry point to network. The security policies are still
defined centrally. The aim with this approach is to retain the
advantages of firewalls while resolving the disadvantages
mentioned below [3].
Paper ID: 07091302 238
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
 
Volume 2 Issue 9, September 2013
www.ijsr.net
Figure 1: A distributed firewall architecture
There are three notions on which distributed firewalls based.
a) Policy language: This is necessary to define what kind of
connections are allowed or rejected.
b) System management tools like Microsoft’s SMS or ASD.
c) Network level encryption mechanisms for TCP/IP such as
IPSEC.
Basically, using these notions a distributed firewall system
works as follows. The policy language is converted into an
internal format using tool or a compiler. The system
management tool distributed this policy data to all of the
hosts that are protected by the firewall. Then at each host,
the incoming packets are accepted or rejected according to
both the security policy and cryptographic verification of
each sender [3] [6].
One of the critical points in a distributed firewall design is
centralized management of the security policies. For such a
large and complex system, centralized management is very
important to provide consistency across all firewall devices
in the system for enhanced security. Another critical point is
to distribute policies in a secure way. To provide this, there
is a need to use security services that guarantee the integrity,
confidentially, authenticity of security policies [4] [6].
Policy Based Network Management (PBNM) is a new
network management approach that abstracts the task of
network management by providing a system wide approach
to management and configuration. Opposing to traditional
management systems that focus on device characteristics,
PBNM treats the network as a whole and attempt to manage
network as a single entity. PBNM performs this abstraction
with the help of centralized storage, creation and
management of network policies. This is very helpful to
provide consistency, efficiency, reliability and a dynamic
approach to system wide device configuration. Such kinds of
things are very essential when managing security policies in
a Distributed firewall [4] [6].
Figure 2: Architectural model of a PBNM system
4. Advantages and Disadvantages of
Distributed Firewalls
The introduction of distributed firewalls offered some
solutions to the problems cannot be easily handled by
conventional firewalls. The advantages of distributed
firewalls can be stated as follows (Ioannidis, et al. 2000):
‱ Topological independence is one of the main advantages
of distributed firewalls. Since network security no longer
depends on network topology, it provides more flexibility
in defining the security perimeter. Security perimeter can
easily be extended to cover remote hosts and networks
whenever required [8].
‱ Opposing to conventional firewalls, network security is no
more dependent on the single firewall so that problems
like performance bottleneck and traffic congestion are
resolved. Besides, the load on the traditional firewall is
reduced since a large amount of filtering is performed at
the end hosts.
‱ As mentioned earlier, filtering of certain protocols such as
FTP is not so easy on a conventional firewall. Such kind
of a process is much easier on distributed firewalls since
all of the required information is available at the decision
point, which is the end host in general.
‱ The number of outgoing connections does not create so
many difficulties in terms of network administration.
Adding new links or removing existing links does not
affect the network security. Similarly, backdoor
connections that are created by insiders intentionally or
inadvertently do not create new threats to network security
in distributed firewalls [6].
‱ As mentioned, in conventional firewalls there is an
assumption on that insiders are trustable. However, this
assumption is source of several problems. With the
distributed firewall architectures, the insiders are no
longer treated as “unconditionally trusted”. Dividing
network into parts having different security levels is much
easier with distributed firewalls.
‱ Security policy rules are distributed and established on an
as-needed basis. Only the host that needs to communicate
with the external network should determine the relevant
policy. This approach dramatically eases the policy
updating process and does not require each firewall to
maintain the complete policy set.
‱ End-to-end encryption is possible without affecting the
network security in distributed firewall systems. In
conventional firewalls, the use of end-to-end encryption
was causing some problems in network security. On the
other hand, end-to-end encryption significantly improves
Paper ID: 07091302 239
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
 
Volume 2 Issue 9, September 2013
www.ijsr.net
the security of the distributed firewall.
On the other hand, there are some drawbacks of distributed
firewalls that can be summarized as follows [5].
‱ Compliance of security policy for insiders is one of the
major issues of distributed firewalls. This problem
especially occurs when each ending host have the right of
changing security policy. There can be some techniques to
make modifying policies harder but it is not totally
impossible to prevent it.
‱ It is not so easy to implement an intrusion detection
system in a distributed firewall environment. It is possible
to log suspicious connections on local server but these
logs need to be collected and analyzed by security experts
in central services [6].
5. Policies
One of the most often used term in case of network security
and in particular distributed firewall is policy. It is essential
to know about policies. A “security policy” defines the
security rules of a system. Without a defined security policy,
there is no way to know what access is allowed or
disallowed. A simple example for a firewall is:
 Allow all connections to the web server. Deny all other
access.
 The distribution of the policy can be different and varies
with the implementation. It can be either directly pushed
to end systems, or pulled when necessary.
5.1 Pull Technique
While booting up host pings to the central management
server to check whether the central management server is up
and active. It registers with the central management server
and requests for its policies which it should implement. The
central management server provides the host with its
security policies. For example, a license server or a security
clearance server can be asked if a certain communication
should be permitted. A conventional firewall could do the
same, but it lacks important knowledge about the context of
the request. End systems may know things like which files
are involved, and what their security levels might be. Such
information could be carried over a network protocol, but
only by adding complexity
5.2 Push Technique
The push technique is employed when the policies are
updated at the central management side by the network
administrator and the hosts have to be updated immediately.
This push technology ensures that the hosts always have the
updated policies at anytime. The policy language defines
which inbound and outbound connections on any component
of the network policy domain are allowed, and can affect
policy decisions on any layer of the network, being it at
rejecting or passing certain packets or enforcing policies at
the Application Layer.
6. Components of a Distributed Firewall
6.1 Central Management System
Central Management, a component of distributed firewalls,
makes it practical to secure enterprise-wide servers,
desktops, laptops, and workstations. Central management
provides greater control and efficiency and it decreases the
maintenance costs of managing global security installations.
This feature addresses the need to maximize network
security resources by enabling policies to be centrally
configured, deployed, monitored, and updated. From a
single workstation, distributed firewalls can be scanned to
understand the current operating policy and to determine if
updating is required.
6.2 Policy Distribution
The policy distribution scheme should guarantee the
integrity of the policy during transfer. The distribution of the
policy can be different and varies with the implementation.
It can be either directly pushed to end systems, or pulled
when necessary.
6.3 Host-End Implementation
The security policies transmitted from the central
management server have to be implemented by the host. The
host end part of the Distributed Firewall does provide any
administrative control for the network administrator to
control the implementation of policies. The host allows
traffic based on the security rules it has implemented.
7. Conclusion
The aim of this paper is the solution of computer crime
means while user transfer his sensitive and important data or
information, at that time firewalls and distributed firewalls
provides the security during the data transmission. They
provide the legal infrastructure for internet access. Firewalls
provides the facility like only authentic user can access the
computer or internet for his personal use they provides the
authentication. In this paper we have tried to explain or
prove the internet problems and solution of that problem
with the help of distributed firewalls. Firewalls are useful in
many places like college or any institution for data security
or network security purpose. This paper provides the
solution for networking through the distributed firewalls.
References
[1] http://www.seminarprojects.com/Thread-data-security-
in-local-network-using-distributed-firewalls
[2] http://en.wikipedia.org
[3] Bellovin, S. M. 1999. Distributed Firewalls.
[4] Gatus, G. E. P., Safavi-Naini, R. and Willy Susilo. 2004.
Policy Distribution Using COPSPR in a Distributed
Firewall. In Australian Telecommunication Networks
and Applications Conference.
[5] Li, Wei. 2000. Distributed Firewall. GeoInformatica.
4(3):253
[6] Oguzhan ÇAKI, March 2008 ,Thesis on “Access
monitoring system for distributed firewall policies”
Paper ID: 07091302 240
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
 
Volume 2 Issue 9, September 2013
www.ijsr.net
[7] Robert Stepanek, Distributed Firewalls In Article In T-
110.501 Seminar on Network security 2001
[8] Yunus ERDOĞAN, November 2008,Thesis on
“Development of a distributed firewall administration
tool”
Author Profile
Janapatla Lavanya, M.Tech from JNTUH and B.
Tech SVS group of institution Computer Science and
Engineering.
Dr. R. V. Krishnaiah has received Ph. D from JNTU
Ananthapur, M. Tech in CSE from JNTU Hyderabad,
M. Tech in EIE from NIT (former REC) Warangal
and B. Tech in ECE from Bapatla Engineering
College. He has published more than 50 papers in
various journals. His interest includes Data Mining, Software
Engineering, and Image Processing.
Paper ID: 07091302 241

Weitere Àhnliche Inhalte

Was ist angesagt?

Firewall
FirewallFirewall
Firewall
Apo
 
Firewall
FirewallFirewall
Firewall
lmbriscoe
 

Was ist angesagt? (19)

Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Firewall
FirewallFirewall
Firewall
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Firewall
FirewallFirewall
Firewall
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network security
 Network security Network security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 

Ähnlich wie Approach of Data Security in Local Network Using Distributed Firewalls

Paper id 24201492
Paper id 24201492Paper id 24201492
Paper id 24201492
IJRAT
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
ams1ams11
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
Mumbai Academisc
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 
169
169169
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
ImXaib
 

Ähnlich wie Approach of Data Security in Local Network Using Distributed Firewalls (20)

Paper id 24201492
Paper id 24201492Paper id 24201492
Paper id 24201492
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmz
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Blueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingBlueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone Modeling
 
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Interfirewall optimization across various administrative domain for enabling ...
Interfirewall optimization across various administrative domain for enabling ...Interfirewall optimization across various administrative domain for enabling ...
Interfirewall optimization across various administrative domain for enabling ...
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
169
169169
169
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Firewalls
FirewallsFirewalls
Firewalls
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your Network
 
Network security
Network securityNetwork security
Network security
 

Mehr von International Journal of Science and Research (IJSR)

Mehr von International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
 
Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 

KĂŒrzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

KĂŒrzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Approach of Data Security in Local Network Using Distributed Firewalls

  • 1. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064   Volume 2 Issue 9, September 2013 www.ijsr.net Approach of Data Security in Local Network Using Distributed Firewalls 1 J. Lavanya, 2 R. V. Krishnaiah 1 M. Tech in CSE from JNTUH, B. Tech (CSE) SVS Group of Institution, Warangal, India 2 PhD, M. Tech in CSE from JNTU Hyderabad, M. Tech in EIE from NIT, Warangal, India Abstract: Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security policies on a network without restricting its topology on an inside or outside point of view. Use of a policy language and centralized delegating its semantics to all members of the networks domain support application of firewall technology for organizations, which network devices communicate over insecure channels and still allow a logical separation of hosts in- and outside the trusted domain. We introduce the general concepts of such distributed firewalls, its requirements and implications and introduce its suitability to common threats on the Internet, as well as give a short discussion on contemporary implementations. Keywords: Network Security, Security Policy, Pull technique, Push technique, Policy distribution 1. Introduction Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls [1]. A distributed firewall is a mechanism to enforce a network domain security policy through the use of a policy language, a policy distribution scheme enabling policy control from a central point and certificates, enabling the identification of any member of the network policy domain [1]. Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization. They provide virtually unlimited scalability. In addition, they overcome the single point-of-failure problem presented by the perimeter firewall [1]. Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. This is important because the most costly and destructive attacks still originate from within the organization [1]. 2. Issues of Convention Firewalls A firewall is a collection of components, interposed between two networks that filter traffic between them according to some security policy. Some problems with the conventional firewalls that lead to Distributed Firewalls are as follows. 1.Depends on the topology of the network. 2.Do not protect networks from the internal attacks. 3.Unable to handle protocols like FTP and RealAudio. 4.Have single entry point and the failure of this leads to problems. 5.Unable to stop "spoofed" transmissions (i.e., using false source addresses). 6.Unable to log all of the network's activity and unable to dynamically open and close their networking ports [1] . 3. Distributed Approach to Firewall Design As a result of dramatic increase in network complexity and development of new technologies like wireless networks and VPNs, it is not easy to maintain a fixed network topology anymore. Additionally, there are increasing user demands like mobility, security, performance and reliability. As a result of these and the disadvantages mentioned above, conventional firewalls have started to become inadequate [6]. In order to remove such kind of problems, Bellovin and Ioannidis, et al. introduced the concept of distributed firewall. The distributed firewall design is based on the idea of enforcing the policy rules at the endpoints rather than a single entry point to network. The security policies are still defined centrally. The aim with this approach is to retain the advantages of firewalls while resolving the disadvantages mentioned below [3]. Paper ID: 07091302 238
  • 2. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064   Volume 2 Issue 9, September 2013 www.ijsr.net Figure 1: A distributed firewall architecture There are three notions on which distributed firewalls based. a) Policy language: This is necessary to define what kind of connections are allowed or rejected. b) System management tools like Microsoft’s SMS or ASD. c) Network level encryption mechanisms for TCP/IP such as IPSEC. Basically, using these notions a distributed firewall system works as follows. The policy language is converted into an internal format using tool or a compiler. The system management tool distributed this policy data to all of the hosts that are protected by the firewall. Then at each host, the incoming packets are accepted or rejected according to both the security policy and cryptographic verification of each sender [3] [6]. One of the critical points in a distributed firewall design is centralized management of the security policies. For such a large and complex system, centralized management is very important to provide consistency across all firewall devices in the system for enhanced security. Another critical point is to distribute policies in a secure way. To provide this, there is a need to use security services that guarantee the integrity, confidentially, authenticity of security policies [4] [6]. Policy Based Network Management (PBNM) is a new network management approach that abstracts the task of network management by providing a system wide approach to management and configuration. Opposing to traditional management systems that focus on device characteristics, PBNM treats the network as a whole and attempt to manage network as a single entity. PBNM performs this abstraction with the help of centralized storage, creation and management of network policies. This is very helpful to provide consistency, efficiency, reliability and a dynamic approach to system wide device configuration. Such kinds of things are very essential when managing security policies in a Distributed firewall [4] [6]. Figure 2: Architectural model of a PBNM system 4. Advantages and Disadvantages of Distributed Firewalls The introduction of distributed firewalls offered some solutions to the problems cannot be easily handled by conventional firewalls. The advantages of distributed firewalls can be stated as follows (Ioannidis, et al. 2000): ‱ Topological independence is one of the main advantages of distributed firewalls. Since network security no longer depends on network topology, it provides more flexibility in defining the security perimeter. Security perimeter can easily be extended to cover remote hosts and networks whenever required [8]. ‱ Opposing to conventional firewalls, network security is no more dependent on the single firewall so that problems like performance bottleneck and traffic congestion are resolved. Besides, the load on the traditional firewall is reduced since a large amount of filtering is performed at the end hosts. ‱ As mentioned earlier, filtering of certain protocols such as FTP is not so easy on a conventional firewall. Such kind of a process is much easier on distributed firewalls since all of the required information is available at the decision point, which is the end host in general. ‱ The number of outgoing connections does not create so many difficulties in terms of network administration. Adding new links or removing existing links does not affect the network security. Similarly, backdoor connections that are created by insiders intentionally or inadvertently do not create new threats to network security in distributed firewalls [6]. ‱ As mentioned, in conventional firewalls there is an assumption on that insiders are trustable. However, this assumption is source of several problems. With the distributed firewall architectures, the insiders are no longer treated as “unconditionally trusted”. Dividing network into parts having different security levels is much easier with distributed firewalls. ‱ Security policy rules are distributed and established on an as-needed basis. Only the host that needs to communicate with the external network should determine the relevant policy. This approach dramatically eases the policy updating process and does not require each firewall to maintain the complete policy set. ‱ End-to-end encryption is possible without affecting the network security in distributed firewall systems. In conventional firewalls, the use of end-to-end encryption was causing some problems in network security. On the other hand, end-to-end encryption significantly improves Paper ID: 07091302 239
  • 3. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064   Volume 2 Issue 9, September 2013 www.ijsr.net the security of the distributed firewall. On the other hand, there are some drawbacks of distributed firewalls that can be summarized as follows [5]. ‱ Compliance of security policy for insiders is one of the major issues of distributed firewalls. This problem especially occurs when each ending host have the right of changing security policy. There can be some techniques to make modifying policies harder but it is not totally impossible to prevent it. ‱ It is not so easy to implement an intrusion detection system in a distributed firewall environment. It is possible to log suspicious connections on local server but these logs need to be collected and analyzed by security experts in central services [6]. 5. Policies One of the most often used term in case of network security and in particular distributed firewall is policy. It is essential to know about policies. A “security policy” defines the security rules of a system. Without a defined security policy, there is no way to know what access is allowed or disallowed. A simple example for a firewall is:  Allow all connections to the web server. Deny all other access.  The distribution of the policy can be different and varies with the implementation. It can be either directly pushed to end systems, or pulled when necessary. 5.1 Pull Technique While booting up host pings to the central management server to check whether the central management server is up and active. It registers with the central management server and requests for its policies which it should implement. The central management server provides the host with its security policies. For example, a license server or a security clearance server can be asked if a certain communication should be permitted. A conventional firewall could do the same, but it lacks important knowledge about the context of the request. End systems may know things like which files are involved, and what their security levels might be. Such information could be carried over a network protocol, but only by adding complexity 5.2 Push Technique The push technique is employed when the policies are updated at the central management side by the network administrator and the hosts have to be updated immediately. This push technology ensures that the hosts always have the updated policies at anytime. The policy language defines which inbound and outbound connections on any component of the network policy domain are allowed, and can affect policy decisions on any layer of the network, being it at rejecting or passing certain packets or enforcing policies at the Application Layer. 6. Components of a Distributed Firewall 6.1 Central Management System Central Management, a component of distributed firewalls, makes it practical to secure enterprise-wide servers, desktops, laptops, and workstations. Central management provides greater control and efficiency and it decreases the maintenance costs of managing global security installations. This feature addresses the need to maximize network security resources by enabling policies to be centrally configured, deployed, monitored, and updated. From a single workstation, distributed firewalls can be scanned to understand the current operating policy and to determine if updating is required. 6.2 Policy Distribution The policy distribution scheme should guarantee the integrity of the policy during transfer. The distribution of the policy can be different and varies with the implementation. It can be either directly pushed to end systems, or pulled when necessary. 6.3 Host-End Implementation The security policies transmitted from the central management server have to be implemented by the host. The host end part of the Distributed Firewall does provide any administrative control for the network administrator to control the implementation of policies. The host allows traffic based on the security rules it has implemented. 7. Conclusion The aim of this paper is the solution of computer crime means while user transfer his sensitive and important data or information, at that time firewalls and distributed firewalls provides the security during the data transmission. They provide the legal infrastructure for internet access. Firewalls provides the facility like only authentic user can access the computer or internet for his personal use they provides the authentication. In this paper we have tried to explain or prove the internet problems and solution of that problem with the help of distributed firewalls. Firewalls are useful in many places like college or any institution for data security or network security purpose. This paper provides the solution for networking through the distributed firewalls. References [1] http://www.seminarprojects.com/Thread-data-security- in-local-network-using-distributed-firewalls [2] http://en.wikipedia.org [3] Bellovin, S. M. 1999. Distributed Firewalls. [4] Gatus, G. E. P., Safavi-Naini, R. and Willy Susilo. 2004. Policy Distribution Using COPSPR in a Distributed Firewall. In Australian Telecommunication Networks and Applications Conference. [5] Li, Wei. 2000. Distributed Firewall. GeoInformatica. 4(3):253 [6] Oguzhan ÇAKI, March 2008 ,Thesis on “Access monitoring system for distributed firewall policies” Paper ID: 07091302 240
  • 4. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064   Volume 2 Issue 9, September 2013 www.ijsr.net [7] Robert Stepanek, Distributed Firewalls In Article In T- 110.501 Seminar on Network security 2001 [8] Yunus ERDOĞAN, November 2008,Thesis on “Development of a distributed firewall administration tool” Author Profile Janapatla Lavanya, M.Tech from JNTUH and B. Tech SVS group of institution Computer Science and Engineering. Dr. R. V. Krishnaiah has received Ph. D from JNTU Ananthapur, M. Tech in CSE from JNTU Hyderabad, M. Tech in EIE from NIT (former REC) Warangal and B. Tech in ECE from Bapatla Engineering College. He has published more than 50 papers in various journals. His interest includes Data Mining, Software Engineering, and Image Processing. Paper ID: 07091302 241