SlideShare ist ein Scribd-Unternehmen logo
1 von 32
FIREWALLSFIREWALLS
A Paper Presentation
INTRODUCTIONINTRODUCTION
Firewall is a software or hardware
application that is used to protect a device
from external harmful data packets.
The operating systems such as Windows7,
Ubuntu, etc have software based firewalls.
The hardware based firewalls are in routers.
HISTORYHISTORY
The term ‘firewall’ originally referred to a
wall intended to confine a fire or a
potential fire within a building.
Firewall technology came up in 1980’s
when the internet was emerging and a
fairly new concept.
Routers used in late 1980’s were the
predecessors to firewalls being used
today.
GENERATIONS OFGENERATIONS OF
FIREWALLSFIREWALLS
There are three generations of firewalls:
First generation: Packet Filters
The engineers from Digital Equipment Co-
operation introduced packet filter firewalls
first in 1980.
Packet filters act by inspecting “packets”
which transfer between computers to the
internet.
If the packet don’t match with the packet
filters rules, it simply discards the packet or
gives error responses to the source.
The disadvantage of packet filtering: It pays
no attention to whether the packet is a part
of existing traffic stream or not.
Instead, it filters each packet based on the
information contained in the packet such as
source & destination, address and port no.,
etc.
Second generation: Stateful filters
In 1989-1990, Dave Presetto, Jarnardhan
Sharma and Kshitij Nigam from AT&T
Bell Laboratories developed the second
generation of firewalls and named it
circuit level firewalls.
Stateful packet inspection records all
connections passing through and
determines whether the packet is the
start of a new connection, part of an
existing one or not part of any
connection.
The disadvantage of stateful filters: It faces
denial-of–service attack threat. The firewall
can be bombarded with thousands of fake
connection packets to overwhelm it by filling
its connection state memory.
Third Generation: Application layer
Marcus Raman, Wei Xin and Peter
Churchyard developed the first
Application layer firewall named Toolkit.
The key benefit of Application firewall is
it can understand certain applications and
protocols such as the FTP, DNS and
HTTP.
Advantage: able to detect unwanted
protocols passing through an allowed
port or if any protocol is being harmed.
TYPESTYPES
Network layer:
Network layer operate on a relatively
low-level TCP/IP protocol stack, not
allowing packets to pass through the
firewall until they match established the
rule set.
Network firewalls are of two types:
(1)Stateful
(2)Stateless
Stateful: Stateful firewalls maintain
context about active sessions and use
that “state information” to speed up
packet processing.
Any existing network connection can be
described by several properties, including
source and destination IP address, UDP
or TCP ports, and the current stage of
the connections lifetime.
• Stateless: Stateless firewalls require less
memory and can be faster for simple
filters that require less time to filter than
to look up a session.
They can’t make complex decisions
based on what stage communications
between hosts have reached.
Application layer:
 Application layer firewalls work on the
application layer of the TCP/IP stack and
may intercept all packets traveling to or
from on application. They block other
packets.
 Application firewalls function by
determining whether a process should
accept any connection.
 Application firewalls accomplish their
function by hooking into socket calls to
filter the connection between the
application layer and other lower layers.
Proxies:
A proxy server, running either a
dedicated hardware or software or a
general-purpose machine, may act as a
firewall by responding to input packets in
the manner of an application, while
blocking other packets.
Proxies make tampering with an internal
system from the external network,
making security breach more difficult.
FIREWALL ARCHITECTURESFIREWALL ARCHITECTURES
There are five basic common firewall
architectures present:
Screening routers
Screened host gateways
Dual homed gateways
Screened subnets
Belt and suspenders approach
SCREENING ROUTERSSCREENING ROUTERS
This is the simplest of firewalls as it
places packet filters in the router itself.
This is a completely transparent to all the
parties involved in it, but the screening
routers leave a chance of leak of
network.
It merely passes the traffic from source
to destination rather from point to point.
Hence, this makes screening routers
inadequate.
SCREENED HOST GATEWAYSSCREENED HOST GATEWAYS
Hosts and routers are used together for
firewall architecture.
Most commonly used firewalls today
All packet filtering and access control is
performed at the router.
The router permits only that traffic that
the policy permits.
Performs number of functions as well
such as act as gateway for external
network to communicate with internal
network.
DUAL HOMED GATEWAYDUAL HOMED GATEWAY
Dual homed gateways places a single
machine with two networks.
All users must log into the machine
before proceeding to the network, or as
a host for proxy servers, in which user
accounts are not required.
The passing of packets can be done only
after configuring the host making it
complex.
The failure rate is much higher than
screening routers
SCREENED SUBNETSCREENED SUBNET
Screened subnet is similar to screened
host gateway, only one step further.
The screening router is still present at
the first point of entry and screens the
incoming traffic between Internet and the
public hosts.
The functions of that gateway are spread
among multiple hosts. E.g. the host can be
web server or another acts as FTP
server, etc.
BELT AND SUSPENDERSBELT AND SUSPENDERS
APPROACHAPPROACH
It uses screened subnet and takes it one
step further by protecting public
machines from the Internet.
There is a major difference between belt
and suspenders approach and screened
subnet: In screened subnet, proxy
servers perform the entire access control
while in belt and suspenders, proxy
server acts as first line of control. And
internal router back ups the server.
ADVANTAGES ANDADVANTAGES AND
DISADVANTAGESDISADVANTAGES
ADVANTAGES:
 Protect the computer from “bad”
network and give a steady interface.
 Protect the system from external attack
of worms and viruses.
 Help in recognition of threats and
disturbances easily.
DISADVANTAGES:
 Cannot protect from internal attacks,
such as a malicious code being executed.
 Unaffected on organizations with greater
insider threats such as Banks and Military.
 Protection is supposed to be present in
every layer and assess the threat too,
firewall doesn’t give protection in every
layer.
 Cannot protect against transfer of virus
infected programs or files because of
huge range of operating systems and file
types.
CONCLUSIONCONCLUSION
Firewalls in today’s generation of networks
and computer are necessary.
Every computer and router is provided
with the software or hardware form of
firewalls for protection
Firewalls are of various types and each
type is implemented based upon the
security required for network or
computer.
The disadvantages of firewalls need to be
countered and better them for higher
protection of our systems and servers.
REFERENCESREFERENCES
Firewalls (computing), Wikipedia.
Firewalls and Internet Security, Second
Edition; William.R.Cheswick,
Steven.M.Bellovin, Aviel.R.Rublin;
Eastman Publications.
Firewall Architecture, Indonesian Virtual
Company (InVirCom).
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall BharathiKrishna6
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)Jainam Shah
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsAnthony Daniel
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurationsStudent
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)marghali
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 

Was ist angesagt? (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall
Firewall Firewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 

Andere mochten auch

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Firewall
FirewallFirewall
FirewallApo
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Performance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection SystemsPerformance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection SystemsDavide Eynard
 
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)VR Talsaniya
 
An Effective Strategy of Firewall Based Matching Algorithm
An Effective Strategy of Firewall Based Matching AlgorithmAn Effective Strategy of Firewall Based Matching Algorithm
An Effective Strategy of Firewall Based Matching AlgorithmIJMER
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 

Andere mochten auch (17)

Prew14
Prew14Prew14
Prew14
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Performance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection SystemsPerformance Attacks on Intrusion Detection Systems
Performance Attacks on Intrusion Detection Systems
 
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
 
An Effective Strategy of Firewall Based Matching Algorithm
An Effective Strategy of Firewall Based Matching AlgorithmAn Effective Strategy of Firewall Based Matching Algorithm
An Effective Strategy of Firewall Based Matching Algorithm
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
4. system models
4. system models4. system models
4. system models
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 

Ähnlich wie Firewalls (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...
 
Firewall
FirewallFirewall
Firewall
 
Firewall
Firewall Firewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 

Mehr von Shreya Singireddy

Mehr von Shreya Singireddy (10)

Simplify Your Analytics Strategy
Simplify Your Analytics StrategySimplify Your Analytics Strategy
Simplify Your Analytics Strategy
 
Making Advanced Analytics Work for You
Making Advanced Analytics Work for YouMaking Advanced Analytics Work for You
Making Advanced Analytics Work for You
 
What People Analytics Can’t Capture
What People Analytics Can’t CaptureWhat People Analytics Can’t Capture
What People Analytics Can’t Capture
 
The New Patterns of Innovation
The New Patterns of InnovationThe New Patterns of Innovation
The New Patterns of Innovation
 
Marketers flunk the Big Data test
Marketers flunk the Big Data testMarketers flunk the Big Data test
Marketers flunk the Big Data test
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Clouds
CloudsClouds
Clouds
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Firewalls

  • 2. INTRODUCTIONINTRODUCTION Firewall is a software or hardware application that is used to protect a device from external harmful data packets. The operating systems such as Windows7, Ubuntu, etc have software based firewalls. The hardware based firewalls are in routers.
  • 3. HISTORYHISTORY The term ‘firewall’ originally referred to a wall intended to confine a fire or a potential fire within a building. Firewall technology came up in 1980’s when the internet was emerging and a fairly new concept. Routers used in late 1980’s were the predecessors to firewalls being used today.
  • 4. GENERATIONS OFGENERATIONS OF FIREWALLSFIREWALLS There are three generations of firewalls: First generation: Packet Filters The engineers from Digital Equipment Co- operation introduced packet filter firewalls first in 1980. Packet filters act by inspecting “packets” which transfer between computers to the internet. If the packet don’t match with the packet filters rules, it simply discards the packet or gives error responses to the source.
  • 5. The disadvantage of packet filtering: It pays no attention to whether the packet is a part of existing traffic stream or not. Instead, it filters each packet based on the information contained in the packet such as source & destination, address and port no., etc.
  • 6. Second generation: Stateful filters In 1989-1990, Dave Presetto, Jarnardhan Sharma and Kshitij Nigam from AT&T Bell Laboratories developed the second generation of firewalls and named it circuit level firewalls. Stateful packet inspection records all connections passing through and determines whether the packet is the start of a new connection, part of an existing one or not part of any connection.
  • 7. The disadvantage of stateful filters: It faces denial-of–service attack threat. The firewall can be bombarded with thousands of fake connection packets to overwhelm it by filling its connection state memory.
  • 8. Third Generation: Application layer Marcus Raman, Wei Xin and Peter Churchyard developed the first Application layer firewall named Toolkit. The key benefit of Application firewall is it can understand certain applications and protocols such as the FTP, DNS and HTTP. Advantage: able to detect unwanted protocols passing through an allowed port or if any protocol is being harmed.
  • 9.
  • 10. TYPESTYPES Network layer: Network layer operate on a relatively low-level TCP/IP protocol stack, not allowing packets to pass through the firewall until they match established the rule set. Network firewalls are of two types: (1)Stateful (2)Stateless
  • 11. Stateful: Stateful firewalls maintain context about active sessions and use that “state information” to speed up packet processing. Any existing network connection can be described by several properties, including source and destination IP address, UDP or TCP ports, and the current stage of the connections lifetime. • Stateless: Stateless firewalls require less memory and can be faster for simple filters that require less time to filter than to look up a session.
  • 12. They can’t make complex decisions based on what stage communications between hosts have reached.
  • 13. Application layer:  Application layer firewalls work on the application layer of the TCP/IP stack and may intercept all packets traveling to or from on application. They block other packets.  Application firewalls function by determining whether a process should accept any connection.  Application firewalls accomplish their function by hooking into socket calls to filter the connection between the application layer and other lower layers.
  • 14.
  • 15. Proxies: A proxy server, running either a dedicated hardware or software or a general-purpose machine, may act as a firewall by responding to input packets in the manner of an application, while blocking other packets. Proxies make tampering with an internal system from the external network, making security breach more difficult.
  • 16.
  • 17. FIREWALL ARCHITECTURESFIREWALL ARCHITECTURES There are five basic common firewall architectures present: Screening routers Screened host gateways Dual homed gateways Screened subnets Belt and suspenders approach
  • 18. SCREENING ROUTERSSCREENING ROUTERS This is the simplest of firewalls as it places packet filters in the router itself. This is a completely transparent to all the parties involved in it, but the screening routers leave a chance of leak of network. It merely passes the traffic from source to destination rather from point to point. Hence, this makes screening routers inadequate.
  • 19.
  • 20. SCREENED HOST GATEWAYSSCREENED HOST GATEWAYS Hosts and routers are used together for firewall architecture. Most commonly used firewalls today All packet filtering and access control is performed at the router. The router permits only that traffic that the policy permits. Performs number of functions as well such as act as gateway for external network to communicate with internal network.
  • 21.
  • 22. DUAL HOMED GATEWAYDUAL HOMED GATEWAY Dual homed gateways places a single machine with two networks. All users must log into the machine before proceeding to the network, or as a host for proxy servers, in which user accounts are not required. The passing of packets can be done only after configuring the host making it complex. The failure rate is much higher than screening routers
  • 23.
  • 24. SCREENED SUBNETSCREENED SUBNET Screened subnet is similar to screened host gateway, only one step further. The screening router is still present at the first point of entry and screens the incoming traffic between Internet and the public hosts. The functions of that gateway are spread among multiple hosts. E.g. the host can be web server or another acts as FTP server, etc.
  • 25.
  • 26. BELT AND SUSPENDERSBELT AND SUSPENDERS APPROACHAPPROACH It uses screened subnet and takes it one step further by protecting public machines from the Internet. There is a major difference between belt and suspenders approach and screened subnet: In screened subnet, proxy servers perform the entire access control while in belt and suspenders, proxy server acts as first line of control. And internal router back ups the server.
  • 27.
  • 28. ADVANTAGES ANDADVANTAGES AND DISADVANTAGESDISADVANTAGES ADVANTAGES:  Protect the computer from “bad” network and give a steady interface.  Protect the system from external attack of worms and viruses.  Help in recognition of threats and disturbances easily.
  • 29. DISADVANTAGES:  Cannot protect from internal attacks, such as a malicious code being executed.  Unaffected on organizations with greater insider threats such as Banks and Military.  Protection is supposed to be present in every layer and assess the threat too, firewall doesn’t give protection in every layer.  Cannot protect against transfer of virus infected programs or files because of huge range of operating systems and file types.
  • 30. CONCLUSIONCONCLUSION Firewalls in today’s generation of networks and computer are necessary. Every computer and router is provided with the software or hardware form of firewalls for protection Firewalls are of various types and each type is implemented based upon the security required for network or computer. The disadvantages of firewalls need to be countered and better them for higher protection of our systems and servers.
  • 31. REFERENCESREFERENCES Firewalls (computing), Wikipedia. Firewalls and Internet Security, Second Edition; William.R.Cheswick, Steven.M.Bellovin, Aviel.R.Rublin; Eastman Publications. Firewall Architecture, Indonesian Virtual Company (InVirCom).