DATA SECURITY in LAN USING DISTRIBUTED FIREWALL Dr.T.Pandikumar1, Mekonnen Gidey2
Total Page:16
File Type:pdf, Size:1020Kb
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072 DATA SECURITY IN LAN USING DISTRIBUTED FIREWALL Dr.T.Pandikumar1, Mekonnen Gidey2 1Associate Professor, Department of Computer & IT, Defence University, Ethiopia 2M.Tech, Department of Computer & IT, Defence University, Ethiopia ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Computers and Networking have become outside world through wide area networks and the inseparable by now. A number of confidential transactions internet. occur every second and today computers are used mostly Traditional firewalls ( Conventional firewalls ) are for transmission rather than processing of data. So devices often placed on the edge of the network that act Network Security is needed to prevent hacking of data and as a bouncer allowing only certain types of traffic in and to provide authenticated data transfer. Distributed out of the network which often called perimeter firewalls secure the network by protecting critical firewalls. They divide the network into two parts; network endpoints, exactly where hackers want to trusted on one side and un-trusted on the other side. penetrate. It filters traffic from both the Internet and the For this reason they depend heavily on the topology of internal network because the most destructive and costly the network. Moreover, firewalls are a mechanism for hacking attacks still originate from within the policy control and permit a site administrator to set a organization. They provide virtually unlimited scalability. policy on external access. Just as file permissions In addition, they overcome the single point-of-failure enforces an internal security policy and can enforces an problem presented by the perimeter firewall. This paper is external security policy. a survey paper, dealing with the general concepts such distributed firewalls, its requirements and research 1.2 Statements of the problem introduce, its suitability to common threats on the Network security consists of the provisions and policies Internet, as well as give a short discussion on adopted by a network administrator to prevent and contemporary implementations that a distributed firewall monitor unauthorized access, misuse, modification, or gives complete security to the network. denial of services of a computer network and network- accessible resources. This network security can be Keywords— Network Security, Pull technique, Push achieved by firewalls. Those firewalls may be traditional Technique, Policy, Distributed Firewall or distributed firewalls. But Conventional firewalls rely on the notions of restricted topology and controlled entry 1. INTRODUCTION points to function. Restricting the network topology, difficulty in filtering of certain protocols, end-to-end 1.1 Back ground encryption problems and few more problems lead to the Computers and Networking have become inseparable by evolution of distributed firewalls. Some of the problems now. A number of confidential transactions occur every are: second and today computers are used mostly for . Reliance on the topology of the network. transmission rather than processing of data. It needed to . Do not protect networks from the internal attacks. involves the corrective action taken to ease of use protect . Unable to handle some protocols like FTP. from the viruses, prevent hacking of data and to provide . Have single entry point and the failure of these results authenticated data transfer. Firewall is a device or set of into problems. instruments designed to permit or deny network . Causes to network bottlenecks. transmissions based upon a set of rules and regulations . Unauthorized entry points can bypass the network which are frequently used to protect networks from security unauthorized access while permitting legitimate communications to pass or during the sensitive data The Solution to this growing problem will never be found transmission and it is a collection of components, which by simply improving the security technology of traditional are situated between two networks that filters traffic firewall products. between them by means of some security policies. A 1.3 Objectives of the Research Papers firewall can be an effective means of protecting a local system or network systems from network based security The objective of this paper is to brief the solution to the threats while at the same time affording access to the problems of conventional firewalls. What’s needed is an entirely new model of perimeter security that recognizes the strengths of the firewall as an © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 867 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072 enforcement point, and then empowers it to "actively" and out of the network. When traffic flows through the communicate with the rest of the network, responding firewall it is evaluated by a set of rules based on IP to new attacks and modifying security measures address, port, etc. and either allowed or denied. All traffic accordingly. What is required is a distributed firewall entering or leaving the network must pass through this system that integrates and prevents security breaches point. This requirement itself is often one of the downfalls both inside and outside the network. of the firewall. For example, users might go around the firewall by using a modem or some other connection to A distributed firewall is a mechanism to enforce a the Internet. Another problem is encrypted tunnels, which network domain security policy through the use of a provide a hole through the firewall where the traffic isn’t policy language, a policy distribution scheme enabling evaluated and flows freely. policy control from a central point and certificates, enabling the identification of any member of the 2.3 Conventional firewalls Drawbacks. network policy domain. Depends on the topology of the network. 1.4 Significance of these research works . Do not protect networks from the internal attacks (Assumes inside users are “trusted”). Distributed firewalls allow enforcement of security . Firewalls can become a bottleneck policies on a network without restricting its topology on . Multiple entry points make firewalls hard to manage an inside or outside point of view. Distributed firewall . Unable to handle protocols like FTP and Real-Audio. overcomes these problems with the conventional firewall. Single points of access make firewalls hard to manage. They offer the advantage of filtering traffic from both the . Unable to stop spoofed transmissions (i.e., using false Internet and the internal network. source addresses). This document is template. We ask that authors follow . Unable to log all of the network's activity and some simple guidelines. In essence, we ask you to make . Unable to dynamically open and close the networking your paper look exactly like this document. The easiest ports. way to do this is simply to download the template, and To solve these problems of the firewall the evolution of the replace (copy-paste) the content with your own material. distributed firewall comes into picture. In the distributed Number the reference items consecutively in square firewall scheme, policy is still centrally defined: brackets (e.g. [1]). However the authors name can be used enforcement, however takes place on each endpoints. along with the reference number in the running text. The order of reference in the running text should match with the list of references at the end of the paper. 2. CONVENTIONAL FIREWALL 2.1 Firewall A firewall is a system or group of systems (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect “inside” network from “outside network”. It may be a hardware device or a software program running on a secure host computer. In either case, it must have at least Figure 1 Standard firewall example, connection to intranet two network interfaces, one for the network it is intended to protect, and one for the network it is exposed to. A 3. DISTRIBUTED FIREWALL firewall is essentially a security enforcement point that separates a trusted network from an un-trusted one. 3.1 Distributed firewall concepts Firewalls screen all connections between two networks, Distributed firewalls are host-resident security determining which traffic should be allowed and which software applications that protect the enterprise should be disallowed based on some form of security network’s servers and end-user machines against policy decisions determined in advanced by the security unwanted Intrusion and secure the network by administrator. protecting critical points, exactly where hackers want to 2.2 Conventional firewalls penetrate. They are like personal firewalls except they offer several important advantages like central Conventional firewalls are devices often placed on the management, logging, and in some cases, access-control edge of the network that act as a bouncer. The firewall is granularity. These features are necessary to implement used to enforce a central policy of what traffic is allowed in corporate security policies in larger enterprises. © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 868 International Research Journal of Engineering