0% found this document useful (0 votes)
37 views10 pages

A Study of Network Security Systems

The document discusses a study of network security systems and Microsoft parallel firewalls. Specifically, it examines using Microsoft Internet Security and Acceleration (ISA) firewall integrated with Network Load Balancing (NLB) to improve firewall performance as network speeds and traffic volumes increase. The paper proposes testing standalone and parallel (load balanced) Microsoft firewall configurations. It also suggests integrating additional functions like antivirus scanning, traffic monitoring, and bandwidth management. The goal is to determine the impact on network performance and provide a solution to enhance the Microsoft firewall's performance by leveraging Cisco switches to enable NLB. Experimental results will be presented to validate the proposed techniques.

Uploaded by

James Sm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views10 pages

A Study of Network Security Systems

The document discusses a study of network security systems and Microsoft parallel firewalls. Specifically, it examines using Microsoft Internet Security and Acceleration (ISA) firewall integrated with Network Load Balancing (NLB) to improve firewall performance as network speeds and traffic volumes increase. The paper proposes testing standalone and parallel (load balanced) Microsoft firewall configurations. It also suggests integrating additional functions like antivirus scanning, traffic monitoring, and bandwidth management. The goal is to determine the impact on network performance and provide a solution to enhance the Microsoft firewall's performance by leveraging Cisco switches to enable NLB. Experimental results will be presented to validate the proposed techniques.

Uploaded by

James Sm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/262365481

A study of network security systems

Conference Paper · October 2010

CITATIONS READS

2 4,278

4 authors, including:

Fayez W. Zaki Mohamed Ashour


Mansoura University Mansoura University
108 PUBLICATIONS 387 CITATIONS 24 PUBLICATIONS 10 CITATIONS

SEE PROFILE SEE PROFILE

Mohamed Abdel-Azim Mohamed


Mansoura University
128 PUBLICATIONS 653 CITATIONS

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Secure voice over IP Communicator through ISP Network View project

Wireless communications View project

All content following this page was uploaded by Mohamed Abdel-Azim Mohamed on 03 December 2014.

The user has requested enhancement of the downloaded file.


204 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010

A Study of Network Security Systems


Ramy K. Khalil, Fayez W. Zaki , Mohamed M. Ashour, and Mohamed A. Mohamed

University of Mansoura, Faculty of Engineering, Mansoura, Egypt

Summary When a security solution cannot keep pace with the speed
The three primary goals of network security which are of incoming data, it either allows packets through without
confidentiality, integrity and availability can be achieved by using inspection or places incoming packets into a growing queue,
firewalls. Firewalls provide security by applying a security policy thus becoming vulnerable to Denial of Service (DoS)
to arriving packets these policy called security rules and also attacks. With either of these possibilities, even a network
firewalls can perform other functions like Gateway Antivirus,
Gateway Monitor Program to monitor the traffic which pass
with a perfect firewall policy (short in length and optimally
through the firewall and also the firewall can have the ordered [7], [8]) is susceptible to attacks resulting in
responsibility to establish VPN connections. The complexity of prolonged delays, data loss, or both, and it is for this reason
these functions can cause significant delays in the processing of that a new firewall architecture is necessary. Parallel
packets, resulting in degraded performance, traffic bottlenecks, firewall designs provide a low latency solution, scalable to
and ultimately violating Quality of Service constraints. As increasing network speeds [1], [9]. Unlike a traditional
network capacities continue to increase, the improvement of single firewall, the parallel design consists of an array of
firewall performance is a main concern. One technique that firewalls, each performing a portion of the work that a
dramatically reduces required processing is using Network Load single firewall performed. As network speeds increase, the
Balance Technique. This paper describes how the performance
can be effected because of using a Microsoft firewall. in this
additional load is distributed across the array, providing a
paper lots of situations and designs will be tested and results will solution that can be implemented using standard hardware.
be shown to determine the effect of using firewall in performance. The firewall that will be discussed is Microsoft firewall
Also in this paper a new technique to increase firewall which called Internet Security and Acceleration firewall
performance will be discussed and the performance results will be (ISA). In this paper a standalone (ISA) and parallel (ISA)
shown. will be discussed and tested in different scenarios and their
effect on network performance will be calculated. In this
Keywords paper integrations will be applied with firewalls like
Security, firewalls, parallel, policy, management integrate an antivirus with firewall to work as a gateway
antivirus to scan every traffic which pass through the
firewall another monitor program will be added to monitor
1. Introduction the sessions that are established through the firewall, an
integrated program which split or distribute the bandwidth
The three primary goals of network security which are
to users will be added also and here the Microsoft firewall
confidentiality, integrity and availability can be achieved
will have the responsibility to establish VPN connections.
by using firewalls. Firewalls provide security by applying a
Therefore lots of test will be done to examine the
security policy to arriving packets. A policy is a list of rules
performance of Microsoft firewall when it is in standalone
which define an action to perform on matching packets,
and when using parallel Microsoft firewalls and a proposal
such as accept or deny [1]. Determining the appropriate
will be presented to enhance the Microsoft firewall
action is typically done in a first-match fashion, dictated by
performance and this will happen by integration between
the first matching rule appearing in the policy and the time
Cisco and Microsoft products.
required to process packets increases as policies grow
larger and more complex So Network firewalls must
continually improve their performance to meet increasing 2. Microsoft parallel firewalls
network speeds, traffic volumes, and Quality of Service
(QoS) demands. Unfortunately, firewalls often have more Microsoft parallel firewall has another name called
capabilities than standard networking devices, and as a Microsoft Internet Security and Acceleration (ISA)
result the performance of these security devices lags behind integrated with Network Load Balance (NLB) here in this
[2], [3], [4]. Furthermore, computer networks grow not thesis ISA 2006 integrated with NLB will be used. Network
only in speed, but also in size, resulting in convoluted Load Balancing (NLB) enables all cluster hosts on a single
security policies that take longer to apply to each packet [5], subnet to concurrently detect incoming network traffic for
[6]. the cluster Internet Protocol (IP) addresses. On each cluster

Manuscript received June 5, 2010


Manuscript revised June 20, 2010
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010 205

host, the NLB driver acts as a filter between the network NLB algorithm here will depend on switches not in
adapter driver and the TCP/IP stack to distribute the traffic firewalls so as will be seen in the results this will enhance
across the hosts. ISA Server takes over at this point, the network performance. Off course this will not exceed
enabling NLB in complex deployment scenarios, including the budget because any network topology should use two
virtual private networking, Cache Array Routing Protocol products like 6500 Cisco switch to enable NLB through
(CARP), and Firewall Client. By enabling integrated NLB their internal network and enable high availability and fault
on an array of ISA Server firewalls, the framework will be tolerance so here this feature will be used with Microsoft
established for NLB configuration at the network level. That firewall to distribute their functions. A proof of this
is, ISA Server load balances traffic on a per-network basis. proposal will be presented along with experimental results
After enable NLB on the specific networks that wanted to showing that the advantages of this techniques.
be load balanced, ISA Server determines the network
adapter that will be used for that network. If there is more
than one network adapter available, ISA Server selects the 5. Experimental results
network adapter based on name in alphabetical order. ISA
Server performs stateful inspection on all traffic. For this The test will be done by using Microsoft firewall standalone
reason, ISA Server works with Windows NLB to ensure and parallel all of the firewall will have constant number of
that incoming and outgoing traffic for each session is 3000 firewall policy and all of them have Antivirus
handled by the same array member. This is important, integration, monitor integration and bandwidth splitter
because this enables ISA Server to perform stateful integration. Many scenarios will be tested as following:-
inspection on the traffic.
5.1 Without Firewall
When NLB is configured for a network, at least one virtual
IP address must be specified for the network. With NLB There is no firewall on network, so there is only 2950
integration enabled, ISA Server modifies both the network switch to connect servers, then generation of the traffic
properties and the TCP/IP properties of the network adapter. directly from source to destination will be done. Fig 1
Using ISA Server Management, more than one virtual IP shows transmissions of ( 8068560 Kbytes ) In ( 699.6 sec )
address can be configured for each load balanced network. are done and the bandwidth usage is 94481 Kbits/sec.
In some scenarios, such as NLB publishing scenarios,
multiple virtual IP addresses may be used and all the traffic
will pass through firewalls using this virtual IP (VIP).
Here in this paper a proof will be done that the ISA
integrated with NLB is not the best solution for all of cases
and by using the proposal enhancements can be added to
Microsoft firewalls.

3. Extra functions for Microsoft firewall


many integrated software will be added to Microsoft
firewall (ISA) like Virtual Private Network (VPN) [10], Fig.1 Topology for no firewall.
antivirus software to examine the incoming traffic before
being downloaded, bandwidth splitter software to distribute
the bandwidth to all of authenticated users. After those
integrations the test will be done by using different
scenarios and topologies to examine the performance of
Microsoft firewalls.

4. Proposed technique
The proposal is depending on distribute firewall tasks, this
means that instead of using ISA integrated with NLB to
work as a parallel firewalls use standalone ISA and put
them behind two Cisco 6500 switch which will have NLB
enabled through them by using (HSRP) protocol [11] so
Fig.2 Result for no firewall.
206 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010

5.2 Standalone firewall Without VPN


Using only one single firewall without VPN and generate
the same traffic but here it will pass first through the
firewall going to the receiver servers and then the results
will be as Fig 4 shows Results for generated traffic through
standalone firewall from first client, transmissions of
( 8068560 Kbytes ) In ( 1415.1 sec ) are done, the
bandwidth usage is 48121 Kbits/sec and Fig 5 shows
Results for generated traffic through standalone firewall
from second client, transmissions of ( 8068560 Kbytes ) In
( 1401.3 sec) are done, the bandwidth usage is 48121
Kbits/sec. Fig 6 shows processor Usage for Standalone
firewall which equal 45%. Fig .5 Results for generated traffic through standalone firewall from
second client.

Fig.3 Topology Standalone firewall. Fig.6 Standalone firewall processor Usage.

5.3 Standalone firewall With VPN

Using only one single firewall with VPN and generate the
same traffic. Fig 7 shows Results for generated traffic
through standalone firewall from first client, transmissions
of ( 8068560 Kbytes ) In ( 1419.6 sec ) are done, the
bandwidth usage is 46560 Kbits/sec and Fig 8 shows
Results for generated traffic through standalone firewall
from second client, transmissions of ( 8068560 Kbytes ) In
( 1365.8 sec ) are done, the bandwidth usage is 48393
Kbits/sec. Fig 9 shows processor Usage for Standalone
firewall with VPN which equal 91% and this is a huge
number which will lead to hang the system up and thus
becoming vulnerable to Denial of Service (DoS) attacks.

Fig .4 Results for generated traffic through standalone firewall from first
client.
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010 207

bandwidth usage is 62165 Kbits/sec and Fig 12 shows


Results for generated traffic through ISA integrated with
NLB for only internal from second client, transmissions of
( 8068560 Kbytes ) In ( 14532.2 sec ) are done, the
bandwidth usage is 45484 Kbits/sec. Fig 13 shows
processor Usage for first firewall host which equal 41% Fig
14 shows processor Usage for second firewall host which
equal 45%.

Fig .7 Results for generated traffic through standalone firewall from first
client while using VPN.

Fig.10 Topology parallel firewall integrated with NLB for only internal.

Fig. 8 Results for generated traffic through standalone firewall from


second client while using VPN.

Fig.11 Results for generated traffic from first client through Parallell
firewall integrated with NLB for internal network.

Fig.9 Standalone firewall processor Usage while using VPN.

5.4 Enterprise edition ISA integrated with


NLB for only internal Without VPN
Using Enterprise edition ISA integrated with NLB for only Fig.12 Results for generated traffic from second client through parallel
internal Without VPN and generate the same traffic. Fig 11 Firewall integrated with NLB for internal network.
shows Results for generated traffic through ISA integrated
with NLB for only internal from first client, transmissions
of ( 8068560 Kbytes ) In ( 1063.3 sec ) are done, the
208 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010

Fig.13 processor Usage for first parallel firewall integrated with NLB for
internal network.

Fig.16 Results for generated traffic from Second client through parallel
firewall integrated with NLB for internal network with VPN Enabled.

Fig.14 processor Usage for Second parallel firewall integrated with NLB
for internal network

5.5 Enterprise edition ISA integrated with


NLB for only internal With VPN
Using Enterprise edition ISA integrated with NLB for only Fig.17 processor Usage for first parallel firewall integrated with NLB for
internal With VPN and generate the same traffic. Fig 15 internal network with VPN enabled.
shows Results for generated traffic through ISA integrated
with NLB for only internal with VPN from first client,
transmissions of ( 8068560 Kbytes ) In ( 2125.5 sec ) are
done, the bandwidth usage is 31098 Kbits/sec and Fig 16
shows Results for generated traffic through ISA integrated
with NLB for only internal with VPN from second client,
transmissions of ( 8068560 Kbytes ) In ( 942.1 sec ) are
done, the bandwidth usage is 70162 Kbits/sec. Fig 17
shows processor Usage for first firewall host which equal
47% Fig 18 shows processor Usage for second firewall host
which equal 75%.

Fig.18 processor Usage for second parallel firewall integrated with NLB
for internal network with VPN enabled.

5.6 Enterprise edition ISA integrated with


NLB for only internal & External Without
VPN
Using Enterprise edition ISA integrated with NLB for only
Fig.15 Results for generated traffic from first client through parallel internal & external Without VPN and generate the same
firewall integrated with NLB for internal network with VPN Enabled.
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010 209

traffic. Fig 21 shows Results for generated traffic through


ISA integrated with NLB for internal & external without
VPN from first client, transmissions of ( 8068560 Kbytes )
In ( 1900.2 sec ) are done, the bandwidth usage is 34785
Kbits/sec and Fig 22 shows Results for generated traffic
through ISA integrated with NLB for internal & external
without VPN from second client, transmissions of
( 8068560 Kbytes ) In ( 932.9 sec ) are done, the bandwidth
usage is 70852 Kbits/sec. Fig 23 shows processor Usage
for first firewall host which equal 33% Fig 24 shows
processor Usage for second firewall host which equal 44%.

Fig.21 Results for generated traffic from first client through parallel
firewall integrated with NLB for internal & External network.

Fig.19 Topology parallel firewall integrated with NLB for incoming


traffic.

Fig.22 Results for generated traffic from second client through Parallel
firewall integrated with NLB for internal & External network.

Fig.23 processor Usage for first parallel firewall integrated with NLB for
internal & External network.

Fig.20 Topology parallel firewall integrated with NLB for outgoing traffic.
210 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010

Fig.26 Results for generated traffic from second client through parallel
Fig.24 processor Usage for second parallel firewall integrated with NLB firewall integrated with NLB for internal & External network with VPN
for internal & External network. enabled.

5.7 Enterprise edition ISA integrated with


NLB for only internal & External With
VPN
Using Enterprise edition ISA integrated with NLB for only
internal & external With VPN and generate the same traffic.
Fig 25 shows Results for generated traffic through ISA
integrated with NLB for internal & external with VPN from
first client, transmissions of ( 8068560 Kbytes ) In Fig. 27 processor Usage for first parallel firewall integrated with NLB for
( 1461.9 sec ) are done, the bandwidth usage is 45213 internal & External network with VPN enabled.
Kbits/sec and Fig 26 shows Results for generated traffic
through ISA integrated with NLB for internal & external
with VPN from second client, transmissions of ( 8068560
Kbytes ) In ( 1092.4sec ) are done, the bandwidth usage is
60509 Kbits/sec. Fig 27 shows processor Usage for first
firewall host which equal 80% Fig 28 shows processor
Usage for second firewall host which equal 69%.

Fig.28 processor Usage for second parallel firewall integrated with NLB
for internal & External network with VPN enabled.

5.8 Two standalone firewall with two Cisco


6500 switch with HSRP enabled without
VPN
Using two stand alone firewalls with two Cisco switches
6500 with HSRP enabled Without VPN and generate the
same traffic. Fig 30 shows Results for generated traffic
from first client through two standalone firewall with two
Fig.25 Results for generated traffic from first client through parallel Cisco 6500 switch with HSRP enabled, transmissions of
firewall integrated with NLB for internal & External network with VPN ( 8068560 Kbytes ) In ( 821.3 sec ) are done, the bandwidth
enabled.
usage is 80476 Kbits/sec and Fig 31 shows Results for
generated traffic from second client through two standalone
firewall with two Cisco 6500 switch with HSRP enabled,
transmissions of ( 8068560 Kbytes ) In ( 1388.5 sec ) are
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010 211

done, the bandwidth usage is 47603 Kbits/sec. Fig 32


shows processor Usage for first firewall host which equal
43% Fig 33 shows processor Usage for second firewall host
which equal 41%.

Fig 32 processor Usage for first firewall of two standalone firewall with
two Cisco 6500 switch with HSRP enabled.

Fig.33 processor Usage for first firewall of two standalone firewall with
Fig.29 Topology for two standalone firewall with two Cisco 6500 switch two Cisco 6500 switch with HSRP enabled.
with HSRP enabled.

5.9 Two standalone firewall with two Cisco


6500 switch with HSRP enabled with VPN
Using two stand alone firewalls with two Cisco switches
6500 with HSRP enabled With VPN and generate the same
traffic. Fig 34 shows Results for generated traffic from first
client through two standalone firewall with two Cisco 6500
switch with HSRP enabled, transmissions of ( 8068560
Kbytes ) In ( 942.4 sec ) are done, the bandwidth usage is
70135 Kbits/sec and Fig 35 shows Results for generated
traffic from second client through two standalone firewall
with two Cisco 6500 switch with HSRP enabled,
transmissions of ( 8068560 Kbytes ) In ( 1410.1 sec ) are
done, the bandwidth usage is 46873 Kbits/sec. Fig 36
Fig.30 Results for generated traffic from first client through two shows processor Usage for first firewall host which equal
standalone Firewall with two Cisco 6500 switch with HSRP enabled.
75% Fig 37 shows processor Usage for second firewall host
which equal 81%.

Fig.31 Results for generated traffic from second client through two
standalone firewall with two Cisco 6500 switch with HSRP enabled. Fig.34 Results for generated traffic from first client through two
standalone firewall with two Cisco 6500 switch with HSRP enabled using
VPN.
212 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010

us to send 8068560 Kbytes in 821.3 Second and using


bandwidth 80476 Kbits/s and the firewall processor usage
is 43% all of those from the first client computer, in second
client computer the proposed technique allow us to send
8068560 Kbytes in 1388.5 second and using bandwidth
47603 Kbits/s and the firewall processor usage is 41% and
this is the best result comparison with other techniques
because the proposed technique allow us to use more
bandwidth and use smaller time than others. And also the
best solution when using firewall with VPN is the proposed
technique (two standalone firewalls with HSRP enabled in
two Cisco switch) because this technique allow us to send
8068560 Kbytes in 942.4 second and using bandwidth
Fig.35 Results for generated traffic from second client through two 70135 Kbits/s and the firewall processor usage is 75% all
standalone firewall with two Cisco 6500 switch with HSRP enabled using of those from the generated traffic come from first client
VPN. computer, in second client computer the proposed technique
allow us to send 8068560 Kbytes in 1410.1 second and
using bandwidth 47873 Kbits/s and the firewall processor
usage is 81% and this is the best result comparison with
other techniques because the proposed technique allow us
to use more bandwidth and use smaller time than others.
This proposed technique achieve confidentiality because of
VPN, achieve integrity because of using firewall and
achieve availability because of the best performance results
in consuming time and bandwidth usage. The three primary
goals of network security which are confidentiality,
Fig.36 processor Usage for first firewall of two standalone firewall with integrity and availability can be achieved by using the
two Cisco 6500switch with HSRP enabled using VPN. proposed technique integrated with VPN.

References
[1] R. L. Ziegler. Linux Firewalls. New Riders, second edition,
2002.
[2] C. Benecke, “A parallel packet screen for high speed
networks,” in Proceedings of the 15th Annual Computer
Security Applications Conference, 1999.
[3] O. Paul and M. Laurent, “A full bandwidth ATM firewall,”
in Proceedings of the 6th European Symposium on Research
in Computer Security ESORICS’2000, 2000.
Fig.37 processor Usage for second firewall of two standalone firewall [4] E. D. Zwicky, S. Cooper, and D. B. Chapman, Building
with two Cisco 6500 switch with HSRP enabled using VPN. Internet Firewalls. O’Reilly, 2000.
[5] A. Wool, “A quantitative study of firewall configuration
6. Conclusion errors,” IEEE Computer, vol. 37, no. 6, pp. 62 –67, June
2004.
Functional parallelism is a scalable solution for inspecting [6] R. L. Ziegler, Linux Firewalls, 2nd ed. New Riders, 2002.
[7] E. W. Fulp, “Optimization of network firewall policies using
packets in a high-speed environment. However, the system directed acyclical graphs,” in Proceedings of the IEEE
performance is dependent on the number of integrated Internet Management Conference (IM’05), 2005.
functions that the firewall can do and also the number of [8] S. Acharya, J. Wang, Z. Ge, and T. F. Znati, “Traffic-aware
firewall policy or firewall rules that the firewall apply to firewall optimization strategies,” in Proceedings of the IEEE
traffic. This paper described guidelines for Microsoft International Conference on Communications, 2006.
parallel firewall (ISA) in different scenarios but in all [9] E. W. Fulp and R. J. Farley, “A function-parallel architecture
scenarios a fixed number of firewall policy (rules) is used it for highspeed firewalls,” in Proceedings of the IEEE
consists of 3000 rules and generations of 8068560 Kbytes International Conference on Communications, 2006.
are used from computers. As shown in the previous results [10] Virtual Private Networks http://technet.microsoft.com/en-
us/network/bb545442.aspx
the best solution when using firewall without VPN is the [11] Hot Standby Router Protocol (HSRP)
proposed technique (two standalone firewalls with HSRP http://tools.ietf.org/html/rfc2281
enabled in two Cisco switch) because this technique allow

View publication stats

You might also like