A Framework for Reducing the Cost of the Firewall

Authors

  • Alwajeeh M Dept. Computer Science, Saba Region University, Marib, Yemen
  • Noman Alassali S Dept. Computer Science, Saba Region University, Marib, Yemen
  • Ali Alahmadi Y Dept. Computer Science, Saba Region University, Marib, Yemen

DOI:

https://doi.org/10.26438/ijcse/v11i4.16

Keywords:

firewall, client, server, agent, proxy, packet filtering,, user filtering, network security.

Abstract

Today, the world has become like a small village, and the success of any institution has become closely related to communication with the outside world through the Internet. As each institution needs to exchange information from one place to another that exposes sensitive information to danger and spread. Such institutions require the existence of mechanisms to protect this information. The firewall plays an important role in protecting information from unauthorized access. However, the available firewalls are not suitable for all institutions due to their high cost. This paper proposes a micro-firewall for reducing the cost of firewall by avoiding the additional services while maintaining the security, and thus the proposed micro-firewall will suitable the small and medium institutions. The proposed micro-firewall uses two computers, one of them is connected with the internet and the other is connected with the local network, the communication between the two computers is done by using the server and client protocols. The role of the computer connected with the internet is to receive the request from the external user who want access the internal network and verify the identity of the user if he/she is an authorized user or not. If yes it sends the request to the computer connected with the internal network, unless the request is rejected. The role of internal computer is similar to external computer but for internal user. The proposed micro-firewall was compared with other firewalls in terms of the cost reduction. The results showed that the cost of proposed micro-firewall has reduced compared with the cost of the other firewalls.

References

[1] N. Sultana, "A Framework of Wireless Network Security Threats: Solution for Various Information Security Problems," 2019.

[2] K. C. Patel and P. Sharma, "A Review paper on pfsense-an Open source firewall introducing with different capabilities & customization," IJARIIE, vol. 3, pp. 2395-4396, 2017.

[3] N. Rawindaran, A. Jayal, E. Prakash, and C. Hewage, "Cost benefits of using machine learning features in NIDS for cyber security in UK small medium enterprises (SME)," Future Internet, vol. 13, p. 186, 2021.

[4] C. Akturk and C. Cubukcu, "A Decision Making Model Proposal for Firewall Selection," KSII Transactions on Internet and Information Systems (TIIS), vol. 15, pp. 3588-3607, 2021.

[5] T. Jain and N. Jain, "Framework for Web application vulnerability discovery and mitigation by customizing rules through ModSecurity," in 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), 2019, pp. 643-648.

[6] M. Mihalos, S. Nalmpantis, and K. Ovaliadis, "Design and Implementation of Firewall Security Policies using Linux Iptables," Journal of Engineering Science & Technology Review, vol. 12, 2019.

[7] R. Datta, S. Choi, A. Chowdhary, and Y. Park, "P4guard: Designing p4 based firewall," in MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), pp. 1-6, 2018.

[8] A. Sujarwo and J. Tan, "Enterprise firewall virtualization design," in MATEC Web of Conferences, p. 03004, 2018.

[9] J. Surana, K. Singh, N. Bairagi, N. Mehto, and N. Jaiswal, "Survey on next generation firewall," International Journal of Engineering Research and Development, vol. 5, pp. 984-988, 2017.

[10] D. Sampaio and J. Bernardino, "Evaluation of Firewall Open Source Software," in WEBIST, pp. 356-362, 2017.

[11] J. Jeong, J. Seo, G. Cho, H. Kim, and J.-S. Park, "A framework for security services based on software-defined networking," in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp. 150-153, 2015.

[12] M. Liu, W. Dou, S. Yu, and Z. Zhang, "A decentralized cloud firewall framework with resources provisioning cost optimization," IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 621-631, 2014.

[13] M. Strebe and C. Perkins, Firewalls 24seven: Sybex, 2000.

[14] G. Bastien and C. Degu, CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide (CCSP Self-Study): Cisco Press, 2003.

[15] D. L. Shinder and M. Cross, Scene of the Cybercrime: Elsevier, 2008.

[16] J. R. Vacca, Network and system security: Elsevier, 2013.

[17] P. B. Ambhore and K. A. Wankhade, "Proxy Server FOR Intranet Security."

[18] C. L. Schuba, "On the modeling, design, and implementation of firewall technology," Purdue University, 1997.

[19] S. Pinzon, "Top 10 threats to SME data security," WatchGuard Technologies, 2008.

[20] A. Malmgren and S. Persson, "A comparative study of Palo Alto Networks and Juniper Networks next-generation firewalls for a small enterprise network," ed, 2016.

[21] K. Tam, M. H. H. Salvador, K. McAlpine, R. Basile, B. Matsugu, and J. More, UTM Security with Fortinet: Mastering FortiOS: Newnes, 2012.

[22] A. E.-M. A. El-Bawab, Untangle Network Security: Packt Publishing Ltd, 2014.

Downloads

Published

2023-04-30
CITATION
DOI: 10.26438/ijcse/v11i4.16
Published: 2023-04-30

How to Cite

[1]
M. Alwajeeh, S. Noman Alassali, and Y. Ali Alahmadi, “A Framework for Reducing the Cost of the Firewall”, Int. J. Comp. Sci. Eng., vol. 11, no. 4, pp. 1–6, Apr. 2023.

Issue

Section

Research Article