As cyber crimes increase rapidly, a firewall established secured gateways between the internal network and untrusted network. It can be hardware, software or combined devices preventing the network from the malware attack, leakage of confidential information and other security threats. The general syntax of a firewall contains a set of objectives allowing or blocking the network traffic (Artemetal. 2018).
The first reported firewall is called the Packet Firewall that was in 1987. Many companies and organizations used a firewall to provide means of filter traffic as well as monitoring the incoming and outcoming interaction within internet infrastructure. Thus in the domain of information network technology, Firewall works as a core technology that catches widespread attention. In this article, we are going to discuss the useful aspects of firewall technology determining its application and how it performs.
The decision has been taken by the firewall
whether to allow the network is based on a set of rules. This set of rules is
not static. Prior to the 1980s, the predecessors to a firewall for the network
security were routers, as this became useful to halt the network problems. Nevertheless,
the fixing of the set rules present in firewall generation turned into a
serious problem to be solved (Diley, 2020)
- First-generation (packet- Filtering firewalls) – Packet firewall inspects the packets between devices. If the packets don’t match with the packet filter’s set, it can be either rejected or silently discarded. This treats each packet in isolation. According to assignment help experts, these packets can be rectified through network addresses, protocols, source, destination port or numbers. The first published packet filtering firewall developed by Digital Equipment corporation in 1987(William. Retal, 2003).
- Second Generation Firewall – Stateful firewall maintains the scientific knowledge between endpoint by accessing two IP addresses through the 4 Layers OSI model. This provides the basic protection for the state of network connection such as TCP streams. This sort of firewall can’t protect the devices from denial of service attacks ( Chang, 2002).
- Third Generation Firewall or Application Firewall- This advanced version of Firewall has the capacity to filter the packets of any layers. It ably recognizes if a certain protocol like HTTP is being misused or not.
- Next-Generation Firewall (NGFW)- New generation firewall can block the advanced malware and application-layer attack (Wilston.N, 2019). It consists of deep packing inspection, application inspection SSL/SSH and many functionalities to protect the devices from the malware attack.
Next Generation Firewall For Network Security Growth
With the advent of the Internet, it becomes evident to install networking security locked services to protect the usability and integrating of the data. Firewall can modify the URL link, block current emerging threats such as botnets against known malware that targeting the operating system.
As per the Next-generation Market survey in 2018, The key player operating in the next-generation firewall is Palo Alto( 23%), Checkpoint (15%), Fortinet (16%) Juniper networks (23%), Sophos (5%). These leading firewall companies constitute a large market share in the adoption of a firewall as services. These players have used several market strategies to strengthen their position in the market. For example, Fortinet launched new intent-based NGFWs in Feb 2019 that provides robust security architecture and doesn’t hold only a single enforcement point (Allied Market Research, 2019).
These new offerings by the firewall industries provide access to end to end visibility, continuous trust assessment, and granular access control. To know more about firewall technology, you can get assistance from the online assignment help experts.
How Does Firewall Work?
A firewall works on the set of rules,
matches the applied network traffic. Rules can be set as per necessities and
security policies. Firewall secures the traffic at its endpoint called ports.
For example information from IP address, 178.11.121 allowed reaching
destination 179.11.122 over 23. Most traffic that crosses the firewall belongs
to one of the major protocols such as TCP, UDP or ICMP. TCP and UDP have port
numbers whereas ICMP uses specific type code typically facilitates the purpose
of the packet.
Drawbacks Of Firewall
The issues concerning computer threats
emerged as working tools. One of such example is Data Leakages. Windows
computers might have a free firewall option but this doesn’t ensure the best
protection to its users (Mäkelä, P. (2020). On the other side, if a user doesn’t
use a firewall properly, It may lead to false impressions to the user. It may
restrict authorized resources to access valuable information. In fact, a
firewall is unable to protect the service from the spyware, Trojans, and worms
transmitted from potable hard disk, floppy, etc.
As the cyber threats increase rapidly, a firewall inhibits the intruder and prevents malware attacks. Many companies and organizations used a firewall to provide means of filter traffic as well as monitoring the incoming and outcoming interaction within internet infrastructure. The decision has been taken by the firewall whether to allow the network is based on a set of rules. This set of a rule is not static. Nevertheless, the fixing of the set rules present in the firewall generation turned into a serious problem to be solved. Firewall can modify the URL link, block current emerging threats such as botnets against known malware that targeting the operating system. As per researches, new offering by the firewall industries provides access to end visibility, continuous trust assessment, and granular access control. When we talk about is drawbacks, Windows computers might have a free firewall option but this doesn’t ensure the best protection to its users. On the other side, if a user doesn’t use a firewall properly, It may lead to false impressions to the user.
Artem Voronkov, Leonardo A. Martucci, Stephan Lindskog( 2018). Measuring the Usability of Firewall Rule Sets Retrived from-https://ieeexplore.ieee.org/abstract/document/8978923
Allied Market Research( 2020) Next-Generation Firewall Market Outlook – 2025, retrieved from
https://www.alliedmarketresearch.com/next-generation-firewall-marketChang, Rocky (2002). “Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial”. IEEE Communications Magazine. 40 (10): 42–43.
Dilley, J. A., Laghate, P., Summers, J. F., & Devanneaux, T. (2020). U.S. Patent Application No. 16/266,335.Forcepoint (2020). What is a Firewall? Firewalls defined, explained, and explored Retrieved from
Kishan Neupen, Rami J. Haddad, Li Chen ( 2019) Next Generation Firewall for Network Security: A Survey Retrieved From
Mäkelä, P. (2020). Computer threats and countermeasures in modern world.
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (2003)”. Firewalls and Internet Security: repelling the wily hacker