• 제목/요약/키워드: Firewall architecture

검색결과 31건 처리시간 0.02초

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.

System Insecurity - Firewalls

  • Ryu, Youngtae
    • 한국정보시스템학회:학술대회논문집
    • /
    • 한국정보시스템학회 2000년도 춘계학술대회
    • /
    • pp.171-175
    • /
    • 2000
  • The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Encryption is another form of firewall protection which is being incorporated along with other firewall methods. Before choosing a firewall architecture, a company must have the right mind set about the threat. The future will see more integration of firewall technologies and the increased use of standards in the industry. It must also determine what are the possible consequences of a breach in security and then develop a system to counter the threat. Additionally, new firewall technologies will address the potential dangers associated with the use of Java applets and Active X-controls on the Internet.

  • PDF

블랙보드구조를 활용한 보안 모델의 연동 (Coordination among the Security Systems using the Blackboard Architecture)

  • 서희석;조대호
    • 제어로봇시스템학회논문지
    • /
    • 제9권4호
    • /
    • pp.310-319
    • /
    • 2003
  • As the importance and the need for network security are increased, many organizations use the various security systems. They enable to construct the consistent integrated security environment by sharing the network vulnerable information among IDS (Intrusion Detection System), firewall and vulnerable scanner. The multiple IDSes coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (Blackboard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (Blackboard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete Event system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses to these detection information.

Fire Resistance Characteristics of Firewall Structure Associated with Impact Damage Induced by Explosion

  • Hye Rim Cho;Jeong Hwa Yoo;Jung Kwan Seo
    • 한국해양공학회지
    • /
    • 제37권3호
    • /
    • pp.99-110
    • /
    • 2023
  • When a fire accident accompanied by an explosion occurs, the surrounding firewalls are affected by impact and thermal loads. Damaged firewalls due to accidental loads may not fully perform their essential function. Therefore, this paper proposes an advanced methodology for evaluating the fire resistance performance of firewalls damaged by explosions. The fragments were assumed to be scattered, and fire occurred as a vehicle exploded in a large compartment of a roll-on/roll-off (RO-RO) vessel. The impact velocity of the fragments was calculated based on the TNT equivalent mass corresponding to the explosion pressure. Damage and thermal-structural response analyses of the firewall were performed using Ansys LS-DYNA code. The fire resistance reduction was analyzed in terms of the temperature difference between fire-exposed and unexposed surfaces, temperature increase rate, and reference temperature arrival time. The degree of damage and the fire resistance performance of the firewalls varied significantly depending on impact loads. When naval ships and RO-RO vessels that carry various explosive substances are designed, it is reasonable to predict that the fire resistance performance will be degraded according to the explosion characteristics of the cargo.

H.323을 지원하는 Application Proxy Server의 설계 (Design of Application Proxy Server for H.323 Protocol)

  • 오영선;이현태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2000년도 추계종합학술대회
    • /
    • pp.296-301
    • /
    • 2000
  • 본 논문에서는 응용 계층에서 수행되는 Proxy Server방식을 이용하여 Firewall이 있는 환경에서 H.323기반 서비스를 지원할 수 있는 기술적 방안을 연구하였다. H.323 프로토콜 서비스 시나리오와 기존의 Firewall방식을 연구하여 H.323 응용서비스 제공하기 위해서 어떠한 문제를 해결해야할 것인지를 연구하고 기존에 설치된 많은 firewall 환경에 적용 가능한 H.323 응용서비스를 위한 Application Proxy Server 구조를 제안하였다.

  • PDF

보안 모델의 연동을 위한 블랙보드구조의 적용 (An Application of Blackboard Architecture for the Coordination among the Security Systems)

  • 서희석;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제11권4호
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

방화벽 접근정책의 계층적 가시화 방법에 대한 연구 (A Study to Hierarchical Visualization of Firewall Access Control Policies)

  • 김태용;권태웅;이준;이윤수;송중석
    • 정보보호학회논문지
    • /
    • 제30권6호
    • /
    • pp.1087-1101
    • /
    • 2020
  • 빠르게 진화하는 다양한 사이버공격으로부터 내부 네트워크와 정보를 보호하기 위해 다양한 보안장비를 사용한다. 그 중 대표적으로 사용하는 보안장비는 방화벽이며, 방화벽은 접근정책이라는 텍스트 기반의 필터링 규칙을 사용해 내·외로부터 통신하는 접근을 허용하거나 차단하여 악의적인 공격을 사전에 방어할 수 있다. 내부의 정보를 보호하기 위해 수많은 접근정책들이 사용하며, 점차 증가하는 접근정책을 효율적으로 관리하기에 여러 가지 어려움이 발생한다. 그 이유는 텍스트 기반의 많은 정보를 분석하기 위해서는 많은 시간 소요와 잔존하는 취약한 정책을 보완하기에는 한계점이 있다. 이와 같은 문제점을 해결하기 위해, 본 논문에서는 직관적인 접근제어 정책 분석 및 관리를 위한 3D 기반의 계층적 가시화 방법을 제안한다. 특히, 계층적 가시화를 통한 드릴-다운 사용자 인터페이스를 제공함으로써, 복잡한 대규모 네트워크의 접근제어 정책을 세부적으로 분석을 지원한다. 제안된 가시화 방법론의 실용성 및 유효성 검증을 위해 시스템을 구현하고, 이를 실제 대규모 네트워크 방화벽 분석에 적용함으로써 성공적으로 제안된 가시화 방법의 적용이 가능함을 보인다.

계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션 (Application of Contract Net Protocol to the Design and Simulation of Network Security Model)

  • 서경진;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제12권4호
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

디지털 콘텐츠의 정보보호 분석 모델 (An Information Security Model for Digital Contents)

  • 윤석규;장희선
    • 융합보안논문지
    • /
    • 제10권3호
    • /
    • pp.9-14
    • /
    • 2010
  • 본 논문에서는 디지털 콘텐츠에 대한 안전하고 신뢰성 있는 유통, 전달, 취약성 점검을 위한 정보보호의 자동분석 방법을 위한 네트워크 구조와 분석 모델을 제시한다. 제시된 네트워크에서는 firewall과 IDS(Intrusion Detection System)를 이용하며, 자체적인 위협을 평가하기 위한 에이전트를 활용하는 방안을 제시하며, 주요 기능으로는 보안 범위 선정, 관련 데이터 수집/분석, 수준평가 및 대책 제시 등을 포함한다. 효율적인 자동화 분석 모델을 개발하기 위해서는 콘텐츠의 상호 유통과 웹서버-사용자간 트래픽 분석에 기초한 네트워크의 설계와 정보보호 및 자동분석 알고리즘의 개발 그리고 효율적인 DRM/PKI 등의 도구 개발이 필요함을 알 수 있다.