An Overview of Firewall Types, Technologies, and Functionalities
Abstract
The networks are increasing day by day and their complexity is also increasing every passing second. The businesses are going online; the payments are done online. Hence the user wants their data to be highly secured and the internet is a public network, no one is safe from threats on the internet, hence the networks must be guarded perfectly so that people can trust the internet and they will continue to work online. One of the protective mechanisms under serious consideration is the firewall [1]. A firewall secures the network at its entry points, it checks all the traffic which passes through the entry point. The allowed IPs are called trusted while disapproved IPs are called untrusted in firewall terminologies. This paper provides an overview of firewall types, functionalities, and technologies.
References
Abie, H. (2000). An overview of firewall technologies. Telektronikk, 96(3), 47-52.
Liu, A. X. (2008). Formal verification of firewall policies. In 2008 IEEE International Conference on Communications (pp. 1494-
. IEEE.
Mothersole, I., & Reed, M. J. (2011). Optimising rule order for a packet filtering firewall. In 2011 Conference on Network and
Information Systems Security (pp. 1-6). IEEE.
Papadaki, M., & Furnell, S. (2004). IDS or IPS: what is best?. Network Security, 2004(7), 15-19.
Sheth, C., & Thakker, R. (2011, February). Performance evaluation and comparative analysis of network firewalls. In 2011
International Conference on Devices and Communications (ICDeCom) (pp. 1-5). IEEE.
Trabelsi, Z., Masud, M. M., & Ghoudi, K. (2015). Statistical dynamic splay tree filters towards multilevel firewall packet filtering
enhancement. Computers & Security, 53, 109-131.
Solanki, V. K., Singh, K. P., Venkatcsan, M., & Raghuwanshi, S. (2013, April). Firewalls policies enhancement strategies towards
securing network. In 2013 IEEE Conference on Information & Communication Technologies (pp. 32-36). IEEE.
Kashefi, I., Kassiri, M., & Shahidinejad, A. (2013). A Survey on Security Issues in Firewalls: A New Approach for Classifying
Firewall Vulnerabilities. Internationla Journal of Engineering Researh and Applications (IJERA), 3(2), 585-591.
Yue, X., Chen, W., & Wang, Y. (2009, November). The research of firewall technology in computer network security. In 2009
Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA) (Vol. 2, pp. 421-424). IEEE.