You are on page 1of 10

FIREWALLS

A Project Report

Submitted to
SAVEETHA INSTITUTE OF MEDICAL AND TECHNICAL SCIENCES
In partial fulfilment for the award of the degree of
BACHELOR OF ENGINEERING IN COMPUTER SCIENCE AND ENGINEERING

Submitted By
B. NITHIN SAI
191811305
Supervisor DR. SARAVANAN

SAVEETHA SCHOOL OF ENGINEERING SAVEETHA INSTITUTE OF MEDICAL


AND TECHNICAL SCIENCES, CHENNAI – 602 105
JANUARY 2021
BONAFIDE CERITIFICATE

Certified that this project report “FIREWALLS” is the bonafiedwork of “B. NITHIN SAI
(191811305)” who carried out the project work under my supervision.

Signature Signature
DR.SP.CHOKALINGAM DR. SARAVANAN
HEAD OF THE DEPARTMENT SUPERVISOR
Professor and Head, Department of CSE Professor,Department of IT
Saveetha School of Engineering Saveetha School oF Engineering
Saveetha Institute oF Medical and Saveetha Institute of Medical and
Technical sciences Technical science

INTERNAL EXAMNIER EXTERNAL EXAMNIER


DECLARATION BY THE CANDIDATE

I declare that the report entitled “FIREWALLS” submitted by me for the degree of Bachelor
of Engineering is the record of the project work carried out by me under the guidance of
“DR. SARAVANAN” and furthermore this work has not formed the basis for the award of
any degree or diploma in this or any other University or other similar institution of higher
learning.

Signature
B.NITHIN
191811305
ACKNOWLEDGEMENT

This project work would not have been possible without the contribution of many people. It
gives me immense pleasure to express my profound gratitude to our honorable Chancellor
Dr.N.M. Veeraiyan, Saveetha Institute of Medical and Technical Sciences, for his blessings
and for being a source of inspiration. I sincerely thank our Vice Chancellor Dr. Rakesh
Kumar Sharma for his visionary thoughts and support. I am indebted to extend my gratitude
to our Director madam Mrs. Ramya Deepak, Saveetha School of Engineering, for facilitating
us all the facilities and extended support to gain valuable education and learning experience. I
register my special thanks to Dr. B.Ramesh, Principal, Saveetha School of Engineeringand Dr
.SP.Chokalingam , HoD, Department of Computerscienceengineering, for the support given
to me in the successful conduct of this project.I wish to express my sincere gratitude to my
supervisor DR. SARAVANAN., for her inspiring guidance, personal involvement and
constant encouragement during the entire course of this work. I am grateful to Project
Coordinators, Review Panel External and Internal Members and the entire faculty of the
Department of Information Technology, for their constructive criticisms and valuable
suggestions which have been a rich source to improve the quality of this work.

B. NITHIN SAI
191811305
INDEX

Abstract 1
Introduction 1
Objectives of the study 1
Literature review 2
 FIREWALL 2
 Types of firewall 2
 Port Scanning 3
 Detecting Attacks 4
 Security Practices 4
Conclusion 6
References 6
FIREWALLS
Abstract :
The increasing complexity of networks, and the need to make them more open due to the
growing emphasis on and attractiveness of the Internet as a medium for business transactions,
mean that networks are becoming more and more exposed to attacks, both from without and
from within. The search is on for mechanisms and techniques for the protection of internal
networks from such attacks. One of the protective mechanisms under serious consideration is
the firewall. A firewall protects a network by guarding the points of entry to it. Firewalls are
becoming more sophisticated by the day, and new features are constantly being added, so
that, in spite of the criticisms made of them and developmental trends threatening them, they
are still a powerful protective mechanism. This article provides an overview of firewall
technologies.
Objectives for study :
 To understand the concept of firewalls
 To use in a proper way to ensure security for the devices and data.
Introduction :
Today's networks change and develop on a regular basis to adapt to new business situations,
such as reorganisations, acquisitions, outsourcing, mergers, joint ventures, and strategic
partnerships, and the increasing degree to which internal networks are connected to the
Internet. The increased complexity and openness of the network thus caused makes the
question of security more complicated than hitherto, and necessitates the development of
sophisticated security technologies at the interface between networks of different security
domains, such as between Intranet and Internet or Extranet. The best way of ensuring
interface security is the use of a firewall.
A Firewall is a computer, router or other communication device that filters access to the
protected network [18]. Cheswick and Bellovin [6] define a firewall as a collection of
components or a system that is placed between two networks and possesses the following
properties:
 All traffic from inside to outside, and vice-versa, must pass through it.
 Only authorised traffic, as defined by the local security policy, is allowed to pass
through it.
 The firewall itself is immune to penetration.
A firewall may consist of a variety of components including host (called bastion host), router
filters (or screens), and services. A gateway is a machine or set of machines that provides
relay services complementing the filters. There may also be a variety of connection types,
such as TCP and UDP, audio or video streaming, and downloading of applets.
This article surveys the basic concept of firewall technology by introducing the various kinds
of approach, their applications, limitations and threats against them.
LITERATURE REVIEW

A firewall is a wall or partition that is designed to prevent fire from spreading from one part
of a building to another. In computer networking, a firewall is designed to control, or filter,
which communications are allowed in and which are allowed out of a device or network, as
shown in the figure. A firewall can be installed on a single computer with the purpose of
protecting that one computer (host-based firewall), or it can be a stand-alone network device
that protects an entire network of computers and all of the host devices on that network
(network-based firewall).

Over the years, as computer and network attacks have become more sophisticated, new types
of firewalls have been developed which serve different purposes in protecting a network.
Here is a list of common firewall types:

 Network Layer Firewall – filtering based on source and destination IP addresses.

 Transport Layer Firewall –filtering based on source and destination data ports, and
filtering based on connection states.

 Application Layer Firewall –filtering based on application, program or service.

 Context Aware Application Firewall – filtering based on the user, device, role,
application type, and threat profile

 Proxy Server – filtering of web content requests like URL, domain, media, etc.

 Reverse Proxy Server – placed in front of web servers, reverse proxy servers protect,
hide, offload, and distribute access to web servers.

 Network Address Translation (NAT) Firewall – hides or masquerades the private


addresses of network hosts.

 Host-based Firewall – filtering of ports and system service calls on a single


computer operating system.

Port scanning :

Port-scanning is a process of probing a computer, server or other network host for open
ports. In networking, each application running on a device is assigned an identifier called a
port number. This port number is used on both ends of the transmission so that the right data
is passed to the correct application. Port-scanning can be used maliciously as a
reconnaissance tool to identify the operating system and services running on a computer or
host, or it can be used harmlessly by a network administrator to verify network security
policies on the network.
For the purposes of evaluating your own computer network’s firewall and port security, you
can use a port-scanning tool like Nmap to find all the open ports on your network. Port-
scanning can be seen as a precursor to a network attack and therefore should not be done on
public servers on the Internet, or on a company network without permission.

To execute an Nmap port-scan of a computer on your local home network, download and
launch a program such as Zenmap, provide the target IP address of the computer you would
like to scan, choose a default scanning profile, and press scan. The Nmap scan will report any
services that are running (e.g., web services, mail services, etc.) and port numbers. The
scanning of a port generally results in one of three responses:

 Open or Accepted – The host replied indicating a service is listening on the port.

 Closed, Denied, or Not Listening – The host replied indicating that connections will
be denied to the port.

 Filtered, Dropped, or Blocked – There was no reply from the host.

To execute a port-scan of your network from outside of the network, you will need to initiate
the scan from outside of the network. This will involve running an Nmap port-scan against
your firewall or router’s public IP address. To discover your public IP address, use a search
engine such as Google with the query “what is my ip address”. The search engine will return
your public IP address.

Detecting Attacks in Real Time :

Software is not perfect. When a hacker exploits a flaw in a piece of software before the
creator can fix it, it is known as a zero-day attack. Due to the sophistication and enormity of
zero-day attacks found today, it is becoming common that network attacks will succeed and
that a successful defense is now measured in how quickly a network can respond to an attack.
The ability to detect attacks as they happen in real-time, as well as stopping the attacks
immediately, or within minutes of occurring, is the ideal goal. Unfortunately, many
companies and organizations today are unable to detect attacks until days or even months
after they have occurred.

 Real Time Scanning from Edge to Endpoint - Detecting attacks in real time
requires actively scanning for attacks using firewall and IDS/IPS network devices. Next
generation client/server malware detection with connections to online global threat
centers must also be used. Today, active scanning devices and software must detect
network anomalies using context-based analysis and behavior detection.

 DDoS Attacks and Real Time Response - DDoS is one of the biggest attack threats
requiring real-time response and detection. DDoS attacks are extremely difficult to
defend against because the attacks originate from hundreds, or thousands of zombie
hosts, and the attacks appear as legitimate traffic, as shown in the figure. For many
companies and organizations, regularly occurring DDoS attacks cripple Internet servers
and network availability. The ability to detect and respond to DDoS attacks in real-time
is crucial.

Security best practices :


Many national and professional organizations have published lists of security best practices.
The following is a list of some security best practices:

 Perform Risk Assessment – Knowing the value of what you are protecting will help
in justifying security expenditures.

 Create a Security Policy – Create a policy that clearly outlines company rules, job
duties, and expectations.

 Physical Security Measures – Restrict access to networking closets, server locations,


as well as fire suppression.

 Human Resource Security Measures – Employees should be properly researched


with background checks.

 Perform and Test Backups – Perform regular backups and test data recovery from
backups.

 Maintain Security Patches and Updates – Regularly update server, client, and
network device operating systems and programs.

 Employ Access Controls – Configure user roles and privilege levels as well as strong
user authentication.

 Regularly Test Incident Response – Employ an incident response team and test
emergency response scenarios.

 Implement a Network Monitoring, Analytics and Management Tool - Choose a


security monitoring solution that integrates with other technologies.

 Implement Network Security Devices – Use next generation routers, firewalls, and
other security appliances.

 Implement a Comprehensive Endpoint Security Solution – Use enterprise level


antimalware and antivirus software.

 Educate Users – Educate users and employees in secure procedures.

 Encrypt data – Encrypt all sensitive company data including email.

Some of the most helpful guidelines are found in organizational repositories such as the
National Institute of Standards and Technology (NIST) Computer Security Resource Center.
One of the most widely known and respected organizations for cybersecurity training is the
SANS Institute. Go here to learn more about SANS and the types of training and
certifications they offer.

Trends Threatening Firewalls Common network denial of service attacks include mail bombs,
ping floods, and attacks using known software bugs, all of which are reported to be on the
increase. This fact alone means that traditional firewalls performing packet analysis using
rules and patterns are no longer adequate protection against network-based attacks. The
traditional assumption that all inside the firewall are friendly and all outside it potentially
hostile, is now becoming somewhat outdated. Internet connectivity has expanded, Extranets
can allow outsiders access to areas protected by firewalls, and some machines require greater
access to the outside than others, which often involves a change in the internal IP address.

Conclusion :

Notwithstanding the limitations of firewalls and the fact that they are neither the panacea of
every security aspect of a network, nor the sole sufficient bulwark against network intrusion,
and despite development trends that threaten them, they are still a powerful protective
mechanism, and will continue to play an important and central role in the maintenance of
network security for some years yet, and any organisation that ignores them does so at its
peril. They continue to change and develop, and new features are regularly added as the need
arises. If developments follow the present trend, they will continue to combine configurable
access control and authentication mechanisms with their traditional functions, thus providing
more powerful and flexible protection for networks to make them secure.

References

1. H. Abie, CORBA Firewall Security: Increasing the Security of CORBA Applications,


January 2000

2. F. M. Avolio, Firewalls: Are We Asking Too Much

3. S. M. Bellovin, Distributed Firewalls, “;login:” November 1999, Special Issue on Security,

4. D. B. Chapman and E. D. Zwicky, Building Internet Firewalls, O'Reilly & Associates, Inc.,
November 1995.

5. Check Point Firewall-1, version 3.0 White Paper, June 1997.

6. W. R. Cheswick and S. M. Bellovin, Firewalls and Internet Security, Repelling the Wily
Hacker, Addison-Wesley Publishing Company, 1994 .

7. G. Dalton, Acceptable Risks, a survey by PricewaterhouseCoopers and InformationWeek

8. FORE Systems, Firewall Switching Agent White Paper, October 1998.

9. Cisco Netacad – Introduction to cybersecurity.

You might also like