Network Access Poudel
Network Access Poudel
Firewall System
Pavan Poudel
Computer and Electronics Engineering
Kantipur Engineering College
TU, Nepal
[email protected]
Abstract—When an internal network is connected to an Firewalls are crucial elements in network security, and have
external network such as Internet, it may suffer from external been widely deployed in most businesses and institutions for
unauthorized access due to the openness of networks. It is securing private networks. The function of a firewall is to
possible for hackers to get access to an internal network, this pose examine each incoming and outgoing packet and decide
great danger to the network resources and information security. whether to accept or to discard the packet based on its policy
In this paper, software based firewall system was proposed to [3]. However, managing firewall rules, especially for enterprise
ensure the integrity and confidentiality of information on the networks, has become complex and error-prone. Firewall
network. The proposed software based firewall system has the filtering rules have to be carefully written and organized in
ability to determine which network traffic should be allowed in
order to correctly implement the security policy. The firewall
or out of the network. For this, the windows filtering platform
(WFP) has been used with which any filtering rule can be added
policy orders how the firewall should handle network traffic for
for the access control. The filtering rules can be applied based on specific IP addresses and address ranges, protocols,
the IP address, port number or application layer protocol types. applications and content types based on the organisation's
The software based firewall system goes a long way in protecting information security policies [5]. In addition, inserting or
an internal network from external unauthorized traffic modifying a filtering rule requires thorough analysis of the
penetration. Moreover, the implementation of the software based relationship between this rule and other rules in order to
firewall system is easy. determine the proper order of this rule and commit the updates
[6].
Keywords— Internet Security; Software Based Firewall;
Computer Network Security; Windows Filtering Platform. II. LITERATURE REVIEW
The packet filtering systems route packets between internal
I. INTRODUCTION
and external hosts, but they do it relationally. They allow or
The Internet is a network of computer networks [1]. It has block certain types of packets in a way that reflects a site’s own
evolved from the interconnection of networks around the security. Every packet has a set of headers containing certain
globe. Interconnection is a good thing; it allows the free information. This information is highly essential to the router
exchange of information via the Web, e-mail and file transfer. and it includes; IP source address, IP destination address,
But it also carries a risk that your Internet connection may be Protocol (whether the packet is a TCP, UDP, or ICMP packet,
used by “hackers” or “crackers” to gain unauthorized access to TCP or UDP source port, TCP or UDP destination port, and
your local network. Availability of computing facilities can ICMP message type and etc) [2].
also be targeted by Denial of Service (DoS) attacks.
The attempts of malicious access and attacks from the
With the increase reliance on computer network, focus Internet to the internal computers of organizations never stop
should also be given to monitor the traffic in and out of the today and corresponding countermeasure for each technique is
system network. With the movement of data or information in required. Most organizations introduce some firewall facilities
and out of networks that has given birth to network security as one of the solutions to protect their internal computers as
threat. The worst situation may arise when the internal well networks from those attacks [4]. Most of the existing
computer network is connected to the Internet. Because of the firewall systems are implemented on hardware, that is, they are
Internet’s openness, every corporate network connected to it is hardware based. Because of the hardware platform, the
vulnerable to attack. Hackers on the internet could break into firewalls have the following shortcomings: they are very
the network and do harm in a number of ways; they can steal or expensive; being hardware based, most of the firewall requires
damage important data, damage individuals computer or their extensive configuration procedure; Network administrators are
entire network, and use the internal network computer specially trained to handle the firewall system; each vendor has
resources [2]. Due to some of these security threats, there was specific configuration procedures for their firewall systems.
the need to build a defensive mechanism that ensures that The implication of this is that the knowledge in one firewall
hackers and their likes are not allowed into the network. Sets of system may not be applicable in another system; most of the
rules are applied to control the type of networking traffic hardware based firewall system cannot be upgraded. The
flowing in and out of the system. Firewalls are designed to stop limitations of the hardware based firewall are reasons for our
unwanted or suspected traffics from flowing into the internal adoption and the implementation of software based approach to
network. firewall development.
By providing a simpler development platform, WFP is
designed to replace previous packet filtering technologies such
as Transport Driver Interface (TDI) filters, Network Driver
Interface Specification (NDIS) filters, and Winsock Layered
Service Providers (LSP) [7]. Starting in Windows Server 2008
and Windows Vista, the firewall hook and the filter hook
drivers are not available; applications that were using these
drivers should use WFP instead.
III. OVERVIEW
ACKNOWLEDGMENT
The authors acknowledge the handful discussion with Mr.
Ajay Kumar Shrestha.
REFERENCES