Understanding Firewall Technology: Types, Advantages And Disadvantages

Potential Topics

The information of an organization is a very important key element and the rate of cyber-attacks is growing very fast. To improve the security of private data information technology developed one new approach which is called firewall technology. In last five years, the use of internet and mobile has increased by 50% in turn increasing various security risks and threats also increased such as data

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

breach, security and privacy issues and DOS attack [1]. The main purpose of this report is to understand the fundamental concept of firewall technology and different types of firewall. A firewall is defined as a security process that contains both hardware’s and software’s that protect organization personal details like login ID and data. It has the ability to reduce unauthorized or unwanted signals from private servers and firewall are designed to protect the user’s computer networks and other peripheral devices [2]. This report is categorized into four parts, for example, an overview of firewall technologies, research methodologies, advantages and disadvantages of the firewall process, and results.

Today, the rate of firewall software is increasing very quickly because it is very simple and easy process to detect any malware or unauthentic signals. Information and communication technology established two technologies to avoid cyber-attack such as firewall and intrusion [3]. Intrusion detection is a new approach in the field of computer science and with the help of this process consumers can identify types of attacks and they can secure their personal information. There are many types of firewall technologies developed which are described below:

It is the most common type of firewall technology and it provides a platform to control and monitor host networks. It is also called as stateless inspection process because it does not keep track of every state of the process [4]. The main drawback of this technology is that it cannot handle multiple requests at a time in a single session. It is observed that numbers of users and organization are purchased stateless packet filtering to reduce security risks. In this technology access control system is provided by third-party sellers and it has the capability to work in an operating system and it can be used for routing process [5].

  • It is very less expansive
  • Low-cost process
  • Use low resources
  • Best suitable for small network and servers
  • It can work only on the layer of the network device
  • It does not support complex models
  • Security and privacy issues

It is an advanced technology of packet filter and it can track the state and situation of every network. The main drawback of a packet filter firewall is that it cannot provide complete detail about each state by which data can be lost at any stage. The information of state table varies according to the firewall product and it involves the IP address of network, destination, numbers of ports and state signals [6]. There are main three important states use for any TCP network, for example, termination, connection establishment, and usage. This type of firewall technology is used by many organizations to monitor and control the state of every data links. If any consumer uses this process then it will identify that the given packet is a part of the developed connection or not.  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • It can be utilized as a primary network
  • This process can be used routers
  • Dynamic in nature
  • Reduce DOS and DDOS attacks
  • Need a lot of memory to store data and track connections
  • Very complex and expansive process
  • It is very limited technology
  • Less secure [7].

Approach

It is also called a proxy server and in which the consumer communicate with gateway with the help of TCP application. When any customer provides their identity and private information then this gateway communicate with network hosts [8]. The main purpose of this firewall technology is to provide information about the application and how an application is working on a computer network. It has the ability to identify unexpected signals and unwanted traffic singles transferred by an attacker.

  • Can be used as a protected method for computer networks
  • Easy to understand
  • Automated Temporary Patches
  • Protection against Zero-day Exploits
  • Stops Data Leakage
  • It does not protect against cyber-attacks
  • Require separate program per application
  • More complex
  • Take more time

It is a combination of both functions and feature and it is more secure technology which can detect unauthorized servers. It is also called as pocket filtering process which is used to combine the proxy firewall with a circuit gateway. This type of method can be used to control the data portion of any packets and it has the capability to identify traffic signals from computer server [8].

  • It provides anonymity to the personal networks
  • Less expansive
  • Low-cost process
  • It does not filter data packets
  • Require more time for implementation
  • Cannot be used for large computer network [7].

There are many differences between firewall technologies which can be understood from following table:

Figure: the difference between various firewall technologies

                                                                   

                                                                     (Source: Gupta, Saikia and Sanghi, 2007)

The research method included different types of strategies and process to understand the concept of firewall technology [9]. There are numbers of research methods used in this research report, for example, design, approach, data collection process, and philosophy of the exploration. The main objective of these methods is to gather knowledge about types of firewall technology and search strategies can improve the effectiveness of the research.

In this research mixed research design is used to understand the working of firewall technology. A mixed method is defined as a combination of both qualitative and quantitative data analysis. In qualitative research data or information is composed of various articles and journal papers in order to realize views of writers on the topic of various firewall technologies.

In this research, paper data is collected with the help of survey and from different articles published by authors. This research design provides a platform to collect data or information about firewall security and all these information written by using Microsoft and excel software’s [10]. In which a literature review is produced to realize working of firewall and it involved various secondary resources and all information are completely based on researcher topic. With the help of both this method research was able to explain the advantages and disadvantages of firewall technique.

In this research data is collected with the help of a secondary type of analysis method and in relevant data or information is gathered from different sources, books, websites, and other resources [11]. Therefore, research used this process to describe different types of firewall technologies and their strength and weakness.

In this research, the writer used a sampling process and random data sampling is used to recognize the difference between firewall technologies. The method of non-probability sampling system avoided by the investigator at the time of the research to certify that biases did not outcome in influencing the conclusion of the research.

Security of data is the very important aspect for any organization and firewall is a process to reduce security threats and risk. From this research, it is founded that cyber-attacks and security issues can be reduced by adopting firewall software and antivirus. The researcher explained different types of firewall technologies and working principle of these security systems [12]. It is observed that the packet filtering firewall cannot be used for large computer networks because it is not much stable technology. To reduce the weakness of the packet filtering process a new model was developed by information security which is known as stateful inspiration method.

Conclusion:

Firewall refers as a security process which is used to detect unwanted signals and malware from computer networks. In this modern generation, many customers use a computer and other peripheral devices to communicate with other and they faced many security issues due to lack of security. This report is explained the working mechanism of firewall technology and their limitation. There are various kinds of firewall system available in the market, for example, Packet filtering firewall, Stateful -inspection firewall, Network address translation firewall, Application-based firewall, and Hybrid firewall which are described in this report. Therefore, consumers should adopt a firewall and other security plans like encryption, and cryptography technologies to reduced cyber-attacks and malware attack.

References:

  1. K., Balasubramanian. “Web Application Vulnerabilities and Their Countermeasures.” In Application Development and Design: Concepts, Methodologies, Tools, and Applications, 22(6), pp. 1312-1342, 2018.
  2. C. Basile and A., Lioy. “Analysis of application-layer filtering policies with application to HTTP.” IEEE/ACM Transactions on Networking (TON), 23(1), pp.28-41, 2015.
  3. N., Gupta, A. Saikia and D., Sanghi. “Web application firewall.” Indian Institute of Technology, Kanpur, 61, p.62, 2007.
  4. X., He, T., Chomsiri, P. Nanda and, Z., Tan. “Improving cloud network security using the Tree-Rule firewall.” Future generation computer systems, 30, pp.116-126, 2014.
  5. N., Jiang, H., Lin, Z. Yin and, C., Xi, “Research of paired industrial firewalls in the defense-in-depth architecture of integrated manufacturing or production system.” In Information and Automation (ICIA), 2017 IEEE International Conference on, 6(2), pp. 523-526, 2017, 2017.
  6. T., Kaur, V. Malhotra and, D., Singh. “Comparison of network security tools-firewall, intrusion detection system, and Honeypot.” Int. J. Enhanced Res. Sci. Technol. Eng, 8(2), pp.200-204, 2014.
  7. W. Koch and, A., Bestavros, “S3B: Software-Defined Secure Server Bindings.” In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), 8(4), pp. 434-444, 2018.
  8. T. Parrott and, T., Kraus. “Louisville One Water: Working to Become an Integrated Utility of the Future.” Proceedings of the Water Environment Federation, 2016(13), pp.2943-2947, 2016.
  9. S.H., Pawar. “A Study on Big Data Security and Data Storage Infrastructure. International Journal, 6(7), p. 20, 2016.
  10. S., Prandl, M. Lazarescu and, D.S., Pham. “A study of web application firewall solutions.” In International Conference on Information Systems Security, 8(2), pp. 501-510, 2015.
  11. G.B. Satrya and, S.Y., Shin. “Optimizing rule on open source firewall using content and pcre combination.” Journal of Advances in Computer Networks, 3(3), pp.308-314, 2015.
  12. H., Zare, P., Olsen, M.J. Zare and, M., Azadi. “Operating System Security Management and Ease of Implementation (Passwords, Firewalls, and Antivirus).” In Information Technology-New Generations, 14(7), pp. 749-755, 2018.

Understanding Firewall Technology: Types, Advantages And Disadvantages

Potential Topics

The information of an organization is a very important key element and the rate of cyber-attacks is growing very fast. To improve the security of private data information technology developed one new approach which is called firewall technology. In last five years, the use of internet and mobile has increased by 50% in turn increasing various security risks and threats also increased such as data

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

breach, security and privacy issues and DOS attack [1]. The main purpose of this report is to understand the fundamental concept of firewall technology and different types of firewall. A firewall is defined as a security process that contains both hardware’s and software’s that protect organization personal details like login ID and data. It has the ability to reduce unauthorized or unwanted signals from private servers and firewall are designed to protect the user’s computer networks and other peripheral devices [2]. This report is categorized into four parts, for example, an overview of firewall technologies, research methodologies, advantages and disadvantages of the firewall process, and results.

Today, the rate of firewall software is increasing very quickly because it is very simple and easy process to detect any malware or unauthentic signals. Information and communication technology established two technologies to avoid cyber-attack such as firewall and intrusion [3]. Intrusion detection is a new approach in the field of computer science and with the help of this process consumers can identify types of attacks and they can secure their personal information. There are many types of firewall technologies developed which are described below:

It is the most common type of firewall technology and it provides a platform to control and monitor host networks. It is also called as stateless inspection process because it does not keep track of every state of the process [4]. The main drawback of this technology is that it cannot handle multiple requests at a time in a single session. It is observed that numbers of users and organization are purchased stateless packet filtering to reduce security risks. In this technology access control system is provided by third-party sellers and it has the capability to work in an operating system and it can be used for routing process [5].

  • It is very less expansive
  • Low-cost process
  • Use low resources
  • Best suitable for small network and servers
  • It can work only on the layer of the network device
  • It does not support complex models
  • Security and privacy issues

It is an advanced technology of packet filter and it can track the state and situation of every network. The main drawback of a packet filter firewall is that it cannot provide complete detail about each state by which data can be lost at any stage. The information of state table varies according to the firewall product and it involves the IP address of network, destination, numbers of ports and state signals [6]. There are main three important states use for any TCP network, for example, termination, connection establishment, and usage. This type of firewall technology is used by many organizations to monitor and control the state of every data links. If any consumer uses this process then it will identify that the given packet is a part of the developed connection or not.  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • It can be utilized as a primary network
  • This process can be used routers
  • Dynamic in nature
  • Reduce DOS and DDOS attacks
  • Need a lot of memory to store data and track connections
  • Very complex and expansive process
  • It is very limited technology
  • Less secure [7].

Approach

It is also called a proxy server and in which the consumer communicate with gateway with the help of TCP application. When any customer provides their identity and private information then this gateway communicate with network hosts [8]. The main purpose of this firewall technology is to provide information about the application and how an application is working on a computer network. It has the ability to identify unexpected signals and unwanted traffic singles transferred by an attacker.

  • Can be used as a protected method for computer networks
  • Easy to understand
  • Automated Temporary Patches
  • Protection against Zero-day Exploits
  • Stops Data Leakage
  • It does not protect against cyber-attacks
  • Require separate program per application
  • More complex
  • Take more time

It is a combination of both functions and feature and it is more secure technology which can detect unauthorized servers. It is also called as pocket filtering process which is used to combine the proxy firewall with a circuit gateway. This type of method can be used to control the data portion of any packets and it has the capability to identify traffic signals from computer server [8].

  • It provides anonymity to the personal networks
  • Less expansive
  • Low-cost process
  • It does not filter data packets
  • Require more time for implementation
  • Cannot be used for large computer network [7].

There are many differences between firewall technologies which can be understood from following table:

Figure: the difference between various firewall technologies

                                                                   

                                                                     (Source: Gupta, Saikia and Sanghi, 2007)

The research method included different types of strategies and process to understand the concept of firewall technology [9]. There are numbers of research methods used in this research report, for example, design, approach, data collection process, and philosophy of the exploration. The main objective of these methods is to gather knowledge about types of firewall technology and search strategies can improve the effectiveness of the research.

In this research mixed research design is used to understand the working of firewall technology. A mixed method is defined as a combination of both qualitative and quantitative data analysis. In qualitative research data or information is composed of various articles and journal papers in order to realize views of writers on the topic of various firewall technologies.

In this research, paper data is collected with the help of survey and from different articles published by authors. This research design provides a platform to collect data or information about firewall security and all these information written by using Microsoft and excel software’s [10]. In which a literature review is produced to realize working of firewall and it involved various secondary resources and all information are completely based on researcher topic. With the help of both this method research was able to explain the advantages and disadvantages of firewall technique.

In this research data is collected with the help of a secondary type of analysis method and in relevant data or information is gathered from different sources, books, websites, and other resources [11]. Therefore, research used this process to describe different types of firewall technologies and their strength and weakness.

In this research, the writer used a sampling process and random data sampling is used to recognize the difference between firewall technologies. The method of non-probability sampling system avoided by the investigator at the time of the research to certify that biases did not outcome in influencing the conclusion of the research.

Security of data is the very important aspect for any organization and firewall is a process to reduce security threats and risk. From this research, it is founded that cyber-attacks and security issues can be reduced by adopting firewall software and antivirus. The researcher explained different types of firewall technologies and working principle of these security systems [12]. It is observed that the packet filtering firewall cannot be used for large computer networks because it is not much stable technology. To reduce the weakness of the packet filtering process a new model was developed by information security which is known as stateful inspiration method.

Conclusion:

Firewall refers as a security process which is used to detect unwanted signals and malware from computer networks. In this modern generation, many customers use a computer and other peripheral devices to communicate with other and they faced many security issues due to lack of security. This report is explained the working mechanism of firewall technology and their limitation. There are various kinds of firewall system available in the market, for example, Packet filtering firewall, Stateful -inspection firewall, Network address translation firewall, Application-based firewall, and Hybrid firewall which are described in this report. Therefore, consumers should adopt a firewall and other security plans like encryption, and cryptography technologies to reduced cyber-attacks and malware attack.

References:

  1. K., Balasubramanian. “Web Application Vulnerabilities and Their Countermeasures.” In Application Development and Design: Concepts, Methodologies, Tools, and Applications, 22(6), pp. 1312-1342, 2018.
  2. C. Basile and A., Lioy. “Analysis of application-layer filtering policies with application to HTTP.” IEEE/ACM Transactions on Networking (TON), 23(1), pp.28-41, 2015.
  3. N., Gupta, A. Saikia and D., Sanghi. “Web application firewall.” Indian Institute of Technology, Kanpur, 61, p.62, 2007.
  4. X., He, T., Chomsiri, P. Nanda and, Z., Tan. “Improving cloud network security using the Tree-Rule firewall.” Future generation computer systems, 30, pp.116-126, 2014.
  5. N., Jiang, H., Lin, Z. Yin and, C., Xi, “Research of paired industrial firewalls in the defense-in-depth architecture of integrated manufacturing or production system.” In Information and Automation (ICIA), 2017 IEEE International Conference on, 6(2), pp. 523-526, 2017, 2017.
  6. T., Kaur, V. Malhotra and, D., Singh. “Comparison of network security tools-firewall, intrusion detection system, and Honeypot.” Int. J. Enhanced Res. Sci. Technol. Eng, 8(2), pp.200-204, 2014.
  7. W. Koch and, A., Bestavros, “S3B: Software-Defined Secure Server Bindings.” In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), 8(4), pp. 434-444, 2018.
  8. T. Parrott and, T., Kraus. “Louisville One Water: Working to Become an Integrated Utility of the Future.” Proceedings of the Water Environment Federation, 2016(13), pp.2943-2947, 2016.
  9. S.H., Pawar. “A Study on Big Data Security and Data Storage Infrastructure. International Journal, 6(7), p. 20, 2016.
  10. S., Prandl, M. Lazarescu and, D.S., Pham. “A study of web application firewall solutions.” In International Conference on Information Systems Security, 8(2), pp. 501-510, 2015.
  11. G.B. Satrya and, S.Y., Shin. “Optimizing rule on open source firewall using content and pcre combination.” Journal of Advances in Computer Networks, 3(3), pp.308-314, 2015.
  12. H., Zare, P., Olsen, M.J. Zare and, M., Azadi. “Operating System Security Management and Ease of Implementation (Passwords, Firewalls, and Antivirus).” In Information Technology-New Generations, 14(7), pp. 749-755, 2018.

Essay Writing Service Features

  • Qualified Writers
  • Flexible pricing
  • Plagiarism-free papers
  • Anonymity
  • Timely delivery
  • 24/7 customer support

Our Experience

No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.
free-features

Free Features

Free revision policy

$10
Free

Free bibliography & reference

$8
Free

Free title page

$8
Free

Free formatting

$8
Free

How Our Essay Writing Service Works

tab-image

First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.

Complete the order form
tab-image

Once we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.

Writer’s assignment
tab-image

As soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.

Completing the order and download

Need anything written?

Use contact for the order

Live Chat+1 763 309 4299EmailWhatsApp

Order your essay today and save 30% with the discount code Contact

Verified by MonsterInsights