Skip to main content

Firewall: A Vital Constituent of Network Security

  • Chapter
  • First Online:
Information Technology Security

Abstract

With the rapid advancement in technology, exchanging information over networks has never been easier than it is today. However, connecting to external networks without compromising internal network assets remains an eternal challenge faced by most establishments and individual users. In the current circumstances, where attackers can easily exploit vulnerabilities in systems and network infrastructure, the firewall continues to play a pivotal role and remains the first line of defence for protecting network infrastructure. In recent years, the number of internet users has increased exponentially, and the use of the internet has changed significantly. Attackers have also become more sophisticated, and threats have increased significantly. Traditional firewalls are no longer sufficient to protect current internet users from emerging threats. To effectively deal with these present emerging threats, firewalls need to be more sophisticated, proactive, and fortified with advanced technologies. Gartner Research has termed these evolved and enhanced firewalls as “Next Generation Firewalls,” which are designed to address the current emerging threats in network security. Next-generation firewalls are equipped with a wide range of techniques and features, including application control, IDS, IPS, sandboxing, AV, DLP, threat intelligence, advanced analytics, and many more to tackle modern threats. This chapter will provide details about firewalls, different firewall technologies, their advantages, and disadvantages. It will also present next-generation firewall technologies designed to counter the recent advances in network security threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stoll C (1989) The Cuckoo’s egg. Doubleday, New York, NY

    Google Scholar 

  2. Cheswick B (1990) The design of a secure internet gateway. In: USENIX summer conference

    Google Scholar 

  3. Eichin MW, Rochlis JA (1989) With microscope and tweezers: an analysis of the internet virus of November 1988. In: IEEE computer society symposium on security and privacy. IEEE Computer Society, Los Alamitos, CA, USA

    Google Scholar 

  4. Ingham K, Forrest S (2002) A history and survey of network firewalls. ACM J

    Google Scholar 

  5. Schneier B (2000) Secrets and lies: digital security in a networked world. Wiley, New York, NY

    Google Scholar 

  6. Lodin S, Schuba C (1998) Firewalls fend off invasions from the net. IEEE Spectrum

    Google Scholar 

  7. Cheswick W, Bellovin S (2003) Firewalls and internet security: repelling the Wily Hacker. Addison-Wesley

    Google Scholar 

  8. Chen S, Iyer R, Whisnant K (2002) Evaluating the security threat of firewall data corruption caused by instruction transient errors. In: International conference on dependable systems and network

    Google Scholar 

  9. Mogul JC (1989) Simple and flexible datagram access controls for Unix-based gateways. In: USENIX summer conference

    Google Scholar 

  10. Chapman D, Zwicky E, Cooper S (2000) Building internet firewalls, 2nd ed. O’Reilly

    Google Scholar 

  11. Wilson J (2005) The future of the firewall. Bus Commun Rev

    Google Scholar 

  12. https://www.firewalls.com/what_is_utm_firewall

  13. Gartner. https://www.gartner.com/en/information-technology/glossary/next-generation-firewalls-ngfws

  14. Audin G (2004) Next-gen firewalls: what to expect. Bus Commun Rev

    Google Scholar 

  15. Ranum MJ (1992) A network firewall. In: First world conference on system administration and security

    Google Scholar 

  16. Teach computer science. https://teachcomputerscience.com/firewall/#Firewall_Security_Techniques

  17. Bellovin S, Cheswick W (1994) Network firewalls. IEEE Commun Mag

    Google Scholar 

  18. NIST Special Publication SP 800-41_Rev1, Sep 2009

    Google Scholar 

  19. Likhar P, Yadav RS (2020) Stealth firewall: invisible wall for network security. In: Innovations in computer science and engineering. LNNS, vol 103. Springer

    Google Scholar 

  20. Suehring S (2015) Linux firewalling, enhancing security with nftables and beyond, 4th ed. Addison-Wesley

    Google Scholar 

  21. Likhar P, Shankar Yadav R (2021) Impacts of replacing venerable iptables and embracing nftables in a new futuristic Linux firewall framework. In: 5th international conference on computing methodologies and communication (ICCMC)

    Google Scholar 

  22. Cisco Annual Internet Report (2018–2023). https://www.cisco.com/c/en/us/solutions/collateral/executiveperspectives/annual-internet-report/white-paper-c11-741490.pdf

  23. The netfilter.org project: netfilter/iptables project. https://netfilter.org/projects/iptables/index.html

  24. Purdy GN (2004) `Linux iptables pocket reference. O'Reilly Media

    Google Scholar 

  25. McHardy P, Ayuso PN (2015) The nftables tutorial. In: Proceedings of the Netdev 0.1, Ottawa, Canada, February 2015

    Google Scholar 

  26. Alex L, Amir K, Joshua H, Zihui G, Dan P, Jia W (2017) Firewall fingerprinting and denial of firewalling attacks. IEEE Trans Inf Forensics Secur 12(7)

    Google Scholar 

  27. Salah K, Sattar K, Sqalli1 M, Al-Shaer E (2011) A potential low-rate DoS attack against network firewalls. Secur Commun Netw 4:136–146

    Google Scholar 

  28. Singh A, Gupta BB (2022) Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions. Int J Semant Web Inf Syst (IJSWIS) 18(1):1–43

    Article  Google Scholar 

  29. Trabelsi Z, Zeidan S, Hayawi K (2019) Denial of firewalling attacks (DoF): the case study of the emerging BlackNurseAttack. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2915792

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Shankar Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yadav, R.S., Likhar, P. (2024). Firewall: A Vital Constituent of Network Security. In: Gountia, D., Dalei, D.K., Mishra, S. (eds) Information Technology Security. Springer Tracts in Electrical and Electronics Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-97-0407-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0407-1_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0406-4

  • Online ISBN: 978-981-97-0407-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics