An Overview of Firewall Types, Technologies, and Functionalities

  • Aftab Ul Nabi
  • Mushtaque Ahmed
  • Ahad Abro
Keywords: Firewall technologies, Network Security, Access Control, Security Policy, Firewall Techniques.

Abstract

The networks are increasing day by day and their complexity is also increasing every passing second. The businesses are going online; the payments are done online. Hence the user wants their data to be highly secured and the internet is a public network, no one is safe from threats on the internet, hence the networks must be guarded perfectly so that people can trust the internet and they will continue to work online. One of the protective mechanisms under serious consideration is the firewall [1]. A firewall secures the network at its entry points, it checks all the traffic which passes through the entry point. The allowed IPs are called trusted while disapproved IPs are called untrusted in firewall terminologies. This paper provides an overview of firewall types, functionalities, and technologies.

References

Abie, H. (2000). An overview of firewall technologies. Telektronikk, 96(3), 47-52.

Liu, A. X. (2008). Formal verification of firewall policies. In 2008 IEEE International Conference on Communications (pp. 1494-

. IEEE.

Mothersole, I., & Reed, M. J. (2011). Optimising rule order for a packet filtering firewall. In 2011 Conference on Network and

Information Systems Security (pp. 1-6). IEEE.

Papadaki, M., & Furnell, S. (2004). IDS or IPS: what is best?. Network Security, 2004(7), 15-19.

Sheth, C., & Thakker, R. (2011, February). Performance evaluation and comparative analysis of network firewalls. In 2011

International Conference on Devices and Communications (ICDeCom) (pp. 1-5). IEEE.

Trabelsi, Z., Masud, M. M., & Ghoudi, K. (2015). Statistical dynamic splay tree filters towards multilevel firewall packet filtering

enhancement. Computers & Security, 53, 109-131.

Solanki, V. K., Singh, K. P., Venkatcsan, M., & Raghuwanshi, S. (2013, April). Firewalls policies enhancement strategies towards

securing network. In 2013 IEEE Conference on Information & Communication Technologies (pp. 32-36). IEEE.

Kashefi, I., Kassiri, M., & Shahidinejad, A. (2013). A Survey on Security Issues in Firewalls: A New Approach for Classifying

Firewall Vulnerabilities. Internationla Journal of Engineering Researh and Applications (IJERA), 3(2), 585-591.

Yue, X., Chen, W., & Wang, Y. (2009, November). The research of firewall technology in computer network security. In 2009

Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA) (Vol. 2, pp. 421-424). IEEE.

Published
2022-08-15
How to Cite
Ul Nabi, A., Ahmed, M., & Abro, A. (2022). An Overview of Firewall Types, Technologies, and Functionalities. International Journal of Computing and Related Technologies, 3(No 1), 10-16. Retrieved from http://ijcrt.smiu.edu.pk/ijcrt/index.php/smiu/article/view/126