SlideShare a Scribd company logo
FIREWALL
Introduction
Firewall is device that provides secure
connectivity between networks
A firewall is a hardware or software designed to
permit or deny network transmissions based upon
a set of rules and is frequently used to protect
networks from unauthorized access while
permitting legitimate communication to pass
A firewall monitors the incoming traffic by
applying set of rule i.e Acess control rules
 In Firewall we have ACL’s ,
IDS/IPS
Intrusion Detection
and Prevention
System (IDS/PDS)
 Intrusion Prevention System:
 Intrusion prevention is the
process of performing intrusion
detection and stopping the
detected incidents
 Intrusion Detection System:
 Intrusion detection is the process
of monitoring the events occurring
in your network and analyzing
them for signs of possible
incidents, violations, or imminent
threats to your security policies.
Network IDS(NIDS)
 It monitors traffic to and from all
devices on the network
 NIDS are placed at various places
in network to monitor traffic to and
from all devices on network
 EX :Snort
Host based IDS(HIDS)
 It only monitors traffic to and from
the device on which IDS is
installed
 HIDS are runs of individual hosts
on the network
 EX : OSSEC – Open Source
Host-based Intrusion Detection
System
Techniques of
IDS
 The three IDS detection methodologies are
typically used to detect incidents.
 Signature-Based Detection compares
signatures against observed events to identify
possible incidents. This is the simplest detection
method because it compares only the current
unit of activity (such as a packet or a log entry,
to a list of signatures) using string comparison
operations.
 Anomaly-Based Detection compares definitions
of what is considered normal activity with
observed events in order to identify significant
deviations. This detection method can be very
effective at spotting previously unknown threats.
 Stateful Protocol Analysis compares
predetermined profiles of generally accepted
definitions for benign protocol activity for each
protocol state against observed events in order
to identify deviations.
Access Control Lists(ACL)
ACL’s are rule or commands that are used to filter traffic entering or
leaving a network . There are two types of ACL’s depending upon the
direction in which the traffic is to be filtered i.e entering or leaving
Outbound ACL: Outbound ACL’s filter traffic that exiting an interface in
the network
Inbound ACL: Inbound ACL’s filter traffic that is entering an interface in
the network
Hardware firewall
 It was expensive
 It was complex when
compare to the software
 Difficult to upgrade
 Difficult to Configure
 Suitable for larger
organizations
Software Firewall
 It was cheaper than
hardware
 It wasn’t complex
 Easy to upgrade
 Can be easily installed or
configure
 Ideal for individual users
Types of Firewall
Packet Filter
firewall
Stateful multilayer
inspection firewall
Circuit level
gateway firewall
Application level
gateway firewall
Cloud based
Firewall
1.Packet
Filtering
Firewall
 A packet filtering firewall applies a set of
rules to each incoming and outgoing IP
packet and the forwards or discards the
packet
 Filtering rules are based on information
contained in a network packet
 Source IP address
 Destination IP address
 Source and destination transport level
address
 IP protocol field
 Interface
 It looks at each packet entering or
leaving the network accepts or
rejects it based on user-defined
rules
Ex: HTTP
Advantages
 Cost
 Low resource usage
 Best suited for smaller
network
Disadvantages
 Can work only on the
network layer
 Do not support complex
rule based support
 Vulnerable to spoofing
2.Application
Level Gateway
Firewall
 An application level gateway , also
called an application proxy , acts as a
rely of application level traffic .
 User request service from proxy.
 Proxy validates requests as legal.
 Then actions request and returns result
to user.
 Can log/audit traffic at application level
EX: FTP , SMTP , HTTP.
 Advantages:
 More secure than packet filter firewalls
 Easy to log and audit incoming traffic
 Disadvantages:
 Additional processing overhead on each
connection
3.Circuit
Level
Gateway
Firewall
It does not permit an end-to-end TCP
connection ; rather , the gateway sets two
TCP connections
A typical use of circuit level gateway is a
situation in which the system
administrator trusts the internal users
The gateway can be configured to support
application level or proxy service on
inbound connections and circuit level
functions for outbound connections
 Advantages:
 Comparatively inexpensive and provide
Anonymity to the private network
 Disadvantages:
 Do not filter individual packets
4.Stateful
Multilayer
Inspection
Firewall
 A stateful inspection packet firewall
tightens up the rules for TCP traffic by
creating a directory of outbound TCP
connections
 There is an entry for each currently
established connection
 It also stores the mac addresses
 Advantages:
 Can work on a transparent mode
allowing direct connections between the
client and the server
 Can also implement algorithms and
complex security models which are
protocol specific , making the
connections and data transfer more
secure
 Disadvantages:
 They require more memory to track
active connections
 Cache table overflow : As more and
more connections are activated , the
cache table grows.
5.Cloud-Based
Firewall
 Cloud Firewalls are software-based ,
cloud deployed network devices, built to
stop or mitigate unwanted access to
private networks. As a new technology
they are designed for modern business
needs.
 Cloud Firewall Types
There are two types of cloud firewalls.
 SaaS Firewalls
 Next Generation Firewalls
i. Next-Gen
Firewall
 Next Generation Firewalls are cloud-based
services intended to deploy within a virtual data
center. They protect an organization’s own
servers in a platform-as-a-service (PaaS) or
infrastructure-as-a-service (IaaS) model. The
firewall application exists on a virtual server and
secures incoming and outgoing traffic between
cloud-based applications.
 Vendors: Barracuda, Check Point Software,
Cisco, Sophos, Juniper Networks, Palo Alto
Networks
ii. Saas Firewalls
 SaaS Firewalls are designed to secure an
organization’s network and its users – not unlike
a traditional on-premises hardware or software
firewall. The only difference is that it’s deployed
off-site from the cloud. This type of firewall can
be called:
 Software-as-a-service firewall (SaaS firewall)
 Security-as-a-service (SECaaS)
 Firewall-as-a-service (FWaaS)
Thank you

More Related Content

What's hot

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
AAKASH S
 
Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
Firewall
FirewallFirewall
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
Patten John
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
waqasahmad1995
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
iberrywifisecurity
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
Akash R
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
Kirti Ahirrao
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 

What's hot (20)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Firewall
FirewallFirewall
Firewall
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 

Similar to Firewall

Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
skknowledge
 
Fire walls
Fire wallsFire walls
Fire walls
Smit Panchal
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
FahmiOlayah
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
Information Technology
 
Computer network 6
Computer network 6Computer network 6
Computer network 6
MDHASNAIN23
 
Firewall
FirewallFirewall
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
fatimagull32
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
saad504633
 
Firewall
FirewallFirewall
Firewall
ArchanaMani2
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
ShrayamManandhar
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
Mohammed Maajidh
 
Day4
Day4Day4
Day4
Jai4uk
 
Firewalls
FirewallsFirewalls
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
ezoicxcom
 
Firewall
Firewall Firewall
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
haq107457
 

Similar to Firewall (20)

Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Fire walls
Fire wallsFire walls
Fire walls
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Computer network 6
Computer network 6Computer network 6
Computer network 6
 
Firewall
FirewallFirewall
Firewall
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Firewall
FirewallFirewall
Firewall
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Day4
Day4Day4
Day4
 
Firewalls
FirewallsFirewalls
Firewalls
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
Firewall Firewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 

Recently uploaded

PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 

Recently uploaded (20)

PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 

Firewall

  • 2. Introduction Firewall is device that provides secure connectivity between networks A firewall is a hardware or software designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communication to pass A firewall monitors the incoming traffic by applying set of rule i.e Acess control rules
  • 3.  In Firewall we have ACL’s , IDS/IPS
  • 4. Intrusion Detection and Prevention System (IDS/PDS)  Intrusion Prevention System:  Intrusion prevention is the process of performing intrusion detection and stopping the detected incidents  Intrusion Detection System:  Intrusion detection is the process of monitoring the events occurring in your network and analyzing them for signs of possible incidents, violations, or imminent threats to your security policies.
  • 5. Network IDS(NIDS)  It monitors traffic to and from all devices on the network  NIDS are placed at various places in network to monitor traffic to and from all devices on network  EX :Snort Host based IDS(HIDS)  It only monitors traffic to and from the device on which IDS is installed  HIDS are runs of individual hosts on the network  EX : OSSEC – Open Source Host-based Intrusion Detection System
  • 6. Techniques of IDS  The three IDS detection methodologies are typically used to detect incidents.  Signature-Based Detection compares signatures against observed events to identify possible incidents. This is the simplest detection method because it compares only the current unit of activity (such as a packet or a log entry, to a list of signatures) using string comparison operations.  Anomaly-Based Detection compares definitions of what is considered normal activity with observed events in order to identify significant deviations. This detection method can be very effective at spotting previously unknown threats.  Stateful Protocol Analysis compares predetermined profiles of generally accepted definitions for benign protocol activity for each protocol state against observed events in order to identify deviations.
  • 7. Access Control Lists(ACL) ACL’s are rule or commands that are used to filter traffic entering or leaving a network . There are two types of ACL’s depending upon the direction in which the traffic is to be filtered i.e entering or leaving Outbound ACL: Outbound ACL’s filter traffic that exiting an interface in the network Inbound ACL: Inbound ACL’s filter traffic that is entering an interface in the network
  • 8. Hardware firewall  It was expensive  It was complex when compare to the software  Difficult to upgrade  Difficult to Configure  Suitable for larger organizations Software Firewall  It was cheaper than hardware  It wasn’t complex  Easy to upgrade  Can be easily installed or configure  Ideal for individual users
  • 9. Types of Firewall Packet Filter firewall Stateful multilayer inspection firewall Circuit level gateway firewall Application level gateway firewall Cloud based Firewall
  • 10. 1.Packet Filtering Firewall  A packet filtering firewall applies a set of rules to each incoming and outgoing IP packet and the forwards or discards the packet  Filtering rules are based on information contained in a network packet  Source IP address  Destination IP address  Source and destination transport level address  IP protocol field  Interface
  • 11.  It looks at each packet entering or leaving the network accepts or rejects it based on user-defined rules Ex: HTTP
  • 12. Advantages  Cost  Low resource usage  Best suited for smaller network Disadvantages  Can work only on the network layer  Do not support complex rule based support  Vulnerable to spoofing
  • 13. 2.Application Level Gateway Firewall  An application level gateway , also called an application proxy , acts as a rely of application level traffic .  User request service from proxy.  Proxy validates requests as legal.  Then actions request and returns result to user.  Can log/audit traffic at application level EX: FTP , SMTP , HTTP.
  • 14.
  • 15.  Advantages:  More secure than packet filter firewalls  Easy to log and audit incoming traffic  Disadvantages:  Additional processing overhead on each connection
  • 16. 3.Circuit Level Gateway Firewall It does not permit an end-to-end TCP connection ; rather , the gateway sets two TCP connections A typical use of circuit level gateway is a situation in which the system administrator trusts the internal users The gateway can be configured to support application level or proxy service on inbound connections and circuit level functions for outbound connections
  • 17.
  • 18.  Advantages:  Comparatively inexpensive and provide Anonymity to the private network  Disadvantages:  Do not filter individual packets
  • 19. 4.Stateful Multilayer Inspection Firewall  A stateful inspection packet firewall tightens up the rules for TCP traffic by creating a directory of outbound TCP connections  There is an entry for each currently established connection  It also stores the mac addresses
  • 20.  Advantages:  Can work on a transparent mode allowing direct connections between the client and the server  Can also implement algorithms and complex security models which are protocol specific , making the connections and data transfer more secure  Disadvantages:  They require more memory to track active connections  Cache table overflow : As more and more connections are activated , the cache table grows.
  • 21. 5.Cloud-Based Firewall  Cloud Firewalls are software-based , cloud deployed network devices, built to stop or mitigate unwanted access to private networks. As a new technology they are designed for modern business needs.  Cloud Firewall Types There are two types of cloud firewalls.  SaaS Firewalls  Next Generation Firewalls
  • 22. i. Next-Gen Firewall  Next Generation Firewalls are cloud-based services intended to deploy within a virtual data center. They protect an organization’s own servers in a platform-as-a-service (PaaS) or infrastructure-as-a-service (IaaS) model. The firewall application exists on a virtual server and secures incoming and outgoing traffic between cloud-based applications.  Vendors: Barracuda, Check Point Software, Cisco, Sophos, Juniper Networks, Palo Alto Networks
  • 23. ii. Saas Firewalls  SaaS Firewalls are designed to secure an organization’s network and its users – not unlike a traditional on-premises hardware or software firewall. The only difference is that it’s deployed off-site from the cloud. This type of firewall can be called:  Software-as-a-service firewall (SaaS firewall)  Security-as-a-service (SECaaS)  Firewall-as-a-service (FWaaS)
  • 24.