Data Security in Local Network Using Distributed Firewall
Data Security in Local Network Using Distributed Firewall
com
ABSTRACT
confidential transactions occur every second and today computers are used mostly for
hacking of data and to provide authenticated data transfer. Network Security can be
and controlled entry points to function. Restricting the network topology, difficulty in
filtering of certain protocols, End-to-End encryption problems and few more problems
policy through the use of a policy language, a policy distribution scheme enabling policy
control from a central point and certificates, enabling the identification of any member of
exactly where hackers want to penetrate. It filters traffic from both the Internet and the
internal network because the most destructive and costly hacking attacks still originate
In our paper we deal with distributed firewall concepts, its evolution, its
components, policies and a sample of the designed policy along with implementation. A
1.Introduction :
protect the enterprise network's servers and end-user machines against unwanted
intrusion. They offer the advantage of filtering traffic from both the Internet and the
internal network. This enables them to prevent hacking attacks that originate from both
the Internet and the internal network. This is important because the most costly and
They are like personal firewalls except they offer several important
larger enterprises. Policies can be defined and pushed out on an enterprise-wide basis.
populate servers and end-users machines, to configure and "push out" consistent security
policies helps to maximize limited resources. The ability to gather reports and maintain
updates centrally makes distributed security practical. Distributed firewalls help in two
ways. Remote end-user machines can be secured . Secondly, they secure critical servers
on the network preventing intrusion by malicious code and "jailing" other such code by
not letting the protected server be used as a launch pad for expanded attacks.
Usually deployed behind the traditional firewall, they provide a second layer
of defense. They work by enabling only essential traffic into the machine they protect,
prohibiting other types of traffic to prevent unwanted intrusions. Whereas the perimeter
Some problems with the conventional firewalls that lead to Distributed Firewalls are
as follows.
• Depends on the topology of the network.
• Has single entry point and the failure of this leads to problems.
• Unable to log all of the network's activity and unable to dynamically open and
close their networking ports.
In order to solve these problems while still retaining the advantages of the
3.Distributed Firewall :
Since all the hosts on the inside are trusted equally, if any of these
machines are subverted, they can be used to launch attacks to other hosts, especially to
trusted hosts for protocols like rlogin. Thus there is a faithful effort from the industry
security organizations to move towards a system which has all the aspects of a desktop
Distributed, host-resident firewalls prevent the hacking of both the PC and its
use as an entry point into the enterprise network. A compromised PC can make the
whole network vulnerable to attacks. The hacker can penetrate the enterprise network
Distributed firewalls are often kernel-mode applications that sit at the bottom of
the OSI stack in the operating system. They filter all traffic regardless of its origin -- the
Internet or the internal network. They treat both the Internet and the internal network as
"unfriendly". They guard the individual machine in the same way that the perimeter
4. Policies :
One of the most often used term in case of network security and in particular
defines the security rules of a system. Without a defined security policy, there is no way
The hosts while booting up pings to the central management server to check
whether the central management server is up and active. It registers with the central
management server and requests for its policies which it should implement. The central
The push technique is employed when the policies are updated at the central
management side by the network administrator and the hosts have to be updated
immediately. This push technology ensures that the hosts always have the updated
policies at anytime.
The policy language defines which inbound and outbound connections on any
component of the network policy domain are allowed, and can affect policy decisions on
any layer of the network, being it at rejecting or passing certain packets or enforcing
provides greater control and efficiency and it decreases the maintenance costs of
managing global security installations. This feature addresses the need to maximize
monitored, and updated. From a single workstation, distributed firewalls can be scanned
The policy distribution scheme should guarantee the integrity of the policy during
transfer. The distribution of the policy can be different and varies with the
necessary.
The security policies transmitted from the central management server have to be
implemented by the host. The host end part of the Distributed Firewall does provide any
policies. The host allows traffic based on the security rules it has implemented.
are read from a file. The implementation is done on OpenBSD. A language to express
policies and resolving requests like KeyNote system is used. A “security policy” defines
the security rules of a system (i.e) to decide what to allow and what not to allow. A
DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALLS www.seminarson.com
Server side:
the server side is passive open and listens using the system listen() call
it accepts the incoming connections using the accept() call
if the packets are from the undesired network (determined using the source IP address)
go to decision;
if the incoming packets request HTTP service i.e. port no - 80 (suppose if HTTP
service is to be avoided)
go to decision;
if the packets contain malicious code
go to decision;
if the host(source IP address) look like an intruder
go to decision;
if all the conditions are overcome then
permit the packets;
decision:
deny the packets and drop them.
permit all other types of packets to go through
The Policy mentioned here checks for conditions that can deny the packets and
afterwards checks for permitting because if we allow permission first then all the packets
may be allowed. This is similar to the usage of Access Control List (ACLs) in routers.
Client side:
the client side is active open and the policies are distributed here
Server side:
This module is the server daemon that runs at the Central management server.
The server listens on a particular port for a request from the client. After accepting the
connection the server daemon pushes out the security policies specific to contacting
client.
Client side:
This module is executed by the client at startup. The client contacts the
Central Management Server. It registers with it as an active host. It then obtains its
updated policies and implements them. After implementing these security policies the
traffic is monitored and controlled based on the security policies. Thus the concept of
server: Creates an object of the service_provider class and embeds it in the registry.
Client side:
private String calculateMacAddr( ): Gets the MAC address of the machine and later
sends it to
6.5.Sample output :
DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALLS www.seminarson.com
The system is implemented in linux operating system and the language used is
Java. The Remote Method Invocation(RMI) architecture of java is used for defining the
policies in the server side and implementing the policies in the client side.
7.Conclusion:
all the clients of the networks from the internal and external attacks.The distributed
firewall system developed by us can allow or deny the traffic meant for a particular
system based on the policy it has to follow.Remote end-user machines can be secured so
they can't be used as entry points into the enterprise network. They secure critical servers
on the network preventing intrusion by malicious code and "jailing" other such code by
not letting the protected server be used as a launch pad for expanded attacks. Because the