A Study of Network Security Systems
A Study of Network Security Systems
net/publication/262365481
CITATIONS READS
2 4,278
4 authors, including:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Mohamed Abdel-Azim Mohamed on 03 December 2014.
Summary When a security solution cannot keep pace with the speed
The three primary goals of network security which are of incoming data, it either allows packets through without
confidentiality, integrity and availability can be achieved by using inspection or places incoming packets into a growing queue,
firewalls. Firewalls provide security by applying a security policy thus becoming vulnerable to Denial of Service (DoS)
to arriving packets these policy called security rules and also attacks. With either of these possibilities, even a network
firewalls can perform other functions like Gateway Antivirus,
Gateway Monitor Program to monitor the traffic which pass
with a perfect firewall policy (short in length and optimally
through the firewall and also the firewall can have the ordered [7], [8]) is susceptible to attacks resulting in
responsibility to establish VPN connections. The complexity of prolonged delays, data loss, or both, and it is for this reason
these functions can cause significant delays in the processing of that a new firewall architecture is necessary. Parallel
packets, resulting in degraded performance, traffic bottlenecks, firewall designs provide a low latency solution, scalable to
and ultimately violating Quality of Service constraints. As increasing network speeds [1], [9]. Unlike a traditional
network capacities continue to increase, the improvement of single firewall, the parallel design consists of an array of
firewall performance is a main concern. One technique that firewalls, each performing a portion of the work that a
dramatically reduces required processing is using Network Load single firewall performed. As network speeds increase, the
Balance Technique. This paper describes how the performance
can be effected because of using a Microsoft firewall. in this
additional load is distributed across the array, providing a
paper lots of situations and designs will be tested and results will solution that can be implemented using standard hardware.
be shown to determine the effect of using firewall in performance. The firewall that will be discussed is Microsoft firewall
Also in this paper a new technique to increase firewall which called Internet Security and Acceleration firewall
performance will be discussed and the performance results will be (ISA). In this paper a standalone (ISA) and parallel (ISA)
shown. will be discussed and tested in different scenarios and their
effect on network performance will be calculated. In this
Keywords paper integrations will be applied with firewalls like
Security, firewalls, parallel, policy, management integrate an antivirus with firewall to work as a gateway
antivirus to scan every traffic which pass through the
firewall another monitor program will be added to monitor
1. Introduction the sessions that are established through the firewall, an
integrated program which split or distribute the bandwidth
The three primary goals of network security which are
to users will be added also and here the Microsoft firewall
confidentiality, integrity and availability can be achieved
will have the responsibility to establish VPN connections.
by using firewalls. Firewalls provide security by applying a
Therefore lots of test will be done to examine the
security policy to arriving packets. A policy is a list of rules
performance of Microsoft firewall when it is in standalone
which define an action to perform on matching packets,
and when using parallel Microsoft firewalls and a proposal
such as accept or deny [1]. Determining the appropriate
will be presented to enhance the Microsoft firewall
action is typically done in a first-match fashion, dictated by
performance and this will happen by integration between
the first matching rule appearing in the policy and the time
Cisco and Microsoft products.
required to process packets increases as policies grow
larger and more complex So Network firewalls must
continually improve their performance to meet increasing 2. Microsoft parallel firewalls
network speeds, traffic volumes, and Quality of Service
(QoS) demands. Unfortunately, firewalls often have more Microsoft parallel firewall has another name called
capabilities than standard networking devices, and as a Microsoft Internet Security and Acceleration (ISA)
result the performance of these security devices lags behind integrated with Network Load Balance (NLB) here in this
[2], [3], [4]. Furthermore, computer networks grow not thesis ISA 2006 integrated with NLB will be used. Network
only in speed, but also in size, resulting in convoluted Load Balancing (NLB) enables all cluster hosts on a single
security policies that take longer to apply to each packet [5], subnet to concurrently detect incoming network traffic for
[6]. the cluster Internet Protocol (IP) addresses. On each cluster
host, the NLB driver acts as a filter between the network NLB algorithm here will depend on switches not in
adapter driver and the TCP/IP stack to distribute the traffic firewalls so as will be seen in the results this will enhance
across the hosts. ISA Server takes over at this point, the network performance. Off course this will not exceed
enabling NLB in complex deployment scenarios, including the budget because any network topology should use two
virtual private networking, Cache Array Routing Protocol products like 6500 Cisco switch to enable NLB through
(CARP), and Firewall Client. By enabling integrated NLB their internal network and enable high availability and fault
on an array of ISA Server firewalls, the framework will be tolerance so here this feature will be used with Microsoft
established for NLB configuration at the network level. That firewall to distribute their functions. A proof of this
is, ISA Server load balances traffic on a per-network basis. proposal will be presented along with experimental results
After enable NLB on the specific networks that wanted to showing that the advantages of this techniques.
be load balanced, ISA Server determines the network
adapter that will be used for that network. If there is more
than one network adapter available, ISA Server selects the 5. Experimental results
network adapter based on name in alphabetical order. ISA
Server performs stateful inspection on all traffic. For this The test will be done by using Microsoft firewall standalone
reason, ISA Server works with Windows NLB to ensure and parallel all of the firewall will have constant number of
that incoming and outgoing traffic for each session is 3000 firewall policy and all of them have Antivirus
handled by the same array member. This is important, integration, monitor integration and bandwidth splitter
because this enables ISA Server to perform stateful integration. Many scenarios will be tested as following:-
inspection on the traffic.
5.1 Without Firewall
When NLB is configured for a network, at least one virtual
IP address must be specified for the network. With NLB There is no firewall on network, so there is only 2950
integration enabled, ISA Server modifies both the network switch to connect servers, then generation of the traffic
properties and the TCP/IP properties of the network adapter. directly from source to destination will be done. Fig 1
Using ISA Server Management, more than one virtual IP shows transmissions of ( 8068560 Kbytes ) In ( 699.6 sec )
address can be configured for each load balanced network. are done and the bandwidth usage is 94481 Kbits/sec.
In some scenarios, such as NLB publishing scenarios,
multiple virtual IP addresses may be used and all the traffic
will pass through firewalls using this virtual IP (VIP).
Here in this paper a proof will be done that the ISA
integrated with NLB is not the best solution for all of cases
and by using the proposal enhancements can be added to
Microsoft firewalls.
4. Proposed technique
The proposal is depending on distribute firewall tasks, this
means that instead of using ISA integrated with NLB to
work as a parallel firewalls use standalone ISA and put
them behind two Cisco 6500 switch which will have NLB
enabled through them by using (HSRP) protocol [11] so
Fig.2 Result for no firewall.
206 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010
Using only one single firewall with VPN and generate the
same traffic. Fig 7 shows Results for generated traffic
through standalone firewall from first client, transmissions
of ( 8068560 Kbytes ) In ( 1419.6 sec ) are done, the
bandwidth usage is 46560 Kbits/sec and Fig 8 shows
Results for generated traffic through standalone firewall
from second client, transmissions of ( 8068560 Kbytes ) In
( 1365.8 sec ) are done, the bandwidth usage is 48393
Kbits/sec. Fig 9 shows processor Usage for Standalone
firewall with VPN which equal 91% and this is a huge
number which will lead to hang the system up and thus
becoming vulnerable to Denial of Service (DoS) attacks.
Fig .4 Results for generated traffic through standalone firewall from first
client.
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010 207
Fig .7 Results for generated traffic through standalone firewall from first
client while using VPN.
Fig.10 Topology parallel firewall integrated with NLB for only internal.
Fig.11 Results for generated traffic from first client through Parallell
firewall integrated with NLB for internal network.
Fig.13 processor Usage for first parallel firewall integrated with NLB for
internal network.
Fig.16 Results for generated traffic from Second client through parallel
firewall integrated with NLB for internal network with VPN Enabled.
Fig.14 processor Usage for Second parallel firewall integrated with NLB
for internal network
Fig.18 processor Usage for second parallel firewall integrated with NLB
for internal network with VPN enabled.
Fig.21 Results for generated traffic from first client through parallel
firewall integrated with NLB for internal & External network.
Fig.22 Results for generated traffic from second client through Parallel
firewall integrated with NLB for internal & External network.
Fig.23 processor Usage for first parallel firewall integrated with NLB for
internal & External network.
Fig.20 Topology parallel firewall integrated with NLB for outgoing traffic.
210 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010
Fig.26 Results for generated traffic from second client through parallel
Fig.24 processor Usage for second parallel firewall integrated with NLB firewall integrated with NLB for internal & External network with VPN
for internal & External network. enabled.
Fig.28 processor Usage for second parallel firewall integrated with NLB
for internal & External network with VPN enabled.
Fig 32 processor Usage for first firewall of two standalone firewall with
two Cisco 6500 switch with HSRP enabled.
Fig.33 processor Usage for first firewall of two standalone firewall with
Fig.29 Topology for two standalone firewall with two Cisco 6500 switch two Cisco 6500 switch with HSRP enabled.
with HSRP enabled.
Fig.31 Results for generated traffic from second client through two
standalone firewall with two Cisco 6500 switch with HSRP enabled. Fig.34 Results for generated traffic from first client through two
standalone firewall with two Cisco 6500 switch with HSRP enabled using
VPN.
212 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010
References
[1] R. L. Ziegler. Linux Firewalls. New Riders, second edition,
2002.
[2] C. Benecke, “A parallel packet screen for high speed
networks,” in Proceedings of the 15th Annual Computer
Security Applications Conference, 1999.
[3] O. Paul and M. Laurent, “A full bandwidth ATM firewall,”
in Proceedings of the 6th European Symposium on Research
in Computer Security ESORICS’2000, 2000.
Fig.37 processor Usage for second firewall of two standalone firewall [4] E. D. Zwicky, S. Cooper, and D. B. Chapman, Building
with two Cisco 6500 switch with HSRP enabled using VPN. Internet Firewalls. O’Reilly, 2000.
[5] A. Wool, “A quantitative study of firewall configuration
6. Conclusion errors,” IEEE Computer, vol. 37, no. 6, pp. 62 –67, June
2004.
Functional parallelism is a scalable solution for inspecting [6] R. L. Ziegler, Linux Firewalls, 2nd ed. New Riders, 2002.
[7] E. W. Fulp, “Optimization of network firewall policies using
packets in a high-speed environment. However, the system directed acyclical graphs,” in Proceedings of the IEEE
performance is dependent on the number of integrated Internet Management Conference (IM’05), 2005.
functions that the firewall can do and also the number of [8] S. Acharya, J. Wang, Z. Ge, and T. F. Znati, “Traffic-aware
firewall policy or firewall rules that the firewall apply to firewall optimization strategies,” in Proceedings of the IEEE
traffic. This paper described guidelines for Microsoft International Conference on Communications, 2006.
parallel firewall (ISA) in different scenarios but in all [9] E. W. Fulp and R. J. Farley, “A function-parallel architecture
scenarios a fixed number of firewall policy (rules) is used it for highspeed firewalls,” in Proceedings of the IEEE
consists of 3000 rules and generations of 8068560 Kbytes International Conference on Communications, 2006.
are used from computers. As shown in the previous results [10] Virtual Private Networks http://technet.microsoft.com/en-
us/network/bb545442.aspx
the best solution when using firewall without VPN is the [11] Hot Standby Router Protocol (HSRP)
proposed technique (two standalone firewalls with HSRP http://tools.ietf.org/html/rfc2281
enabled in two Cisco switch) because this technique allow