Functional features of well-known means of network shielding
Abstract
The work briefly reviews the history, types, and capabilities of the main types of firewalls (FW). Firewalls are an important tool for protecting network resources from various information security threats. With the development of technology and the changing nature of attacks, especially those involving artificial intelligence (IoT), firewalls have also evolved, acquiring new functions and capabilities. This work provides a short survey of the main types, and capabilities of firewall technology, providing solutions to issues of comprehensive protection of network equipment and information resources from modern security threats. Different types of firewalls are used depending on the conditions of operation and purpose of the basic information and communication system (ICS), as well as on the place of their (FW) integration into the network or virtual infrastructure of modern information systems. For integrated networks that require a high level of their security, productivity and flexibility, firewalls of the business segment of generation «Next-generation» and «Threat-focused NGFW» are definitely the best choice. Attention was drawn to the fact that mobile firewalls should in every way contribute to the maintenance of resource consensus and eliminate a possible disparity in the performance of networked mobile applications. Adaptability to mobility of current communication systems (Wi-Fi, GSM and others) determines the specificity of security threats for mobile devices and It defines their key feature. This feature is based on permanent readiness for seamless transitions (reconnections) between different networks in conditions of constant energy shortage and limited available computing resources (meaning gadgets). Highlights the main trends, prospects for the development and implementation of different types of firewalls, including the impact of artificial intelligence, machine learning, cloud technologies and the Internet of Things as well as important aspects of their (FW) scope. It is emphasized that the introduction of FW does not replace other security technologies and tools, but effectively expands the existing arsenal of countering new security threats (primarily as an instrument of proactive countermeasures and rapid response to complex network incidents). The article may be useful for students, researchers, and information security professionals who seek to expand their competencies related to the development and operation of modern means of network protection.
Downloads
References
Azarov, S., Nemtsev, M., & Malakhov, S. Review of analogies and justification of the principles of creation of daemon units for tracking users' network activity. Proceedings of the XX International Scientific and Practical Conference. Graz, Austria. 2023. Pp. 447-453. Available at: https://doi.org/10.46299/ISG.2023.1.20 [In Ukrainian]
Bohdanova, E., Chorna, T., & Malakhov, S. (2022). Overview of the current state of threats caused by the influence of exploits. Computer Science and Cybersecurity, (2), 35-40. URL: https://periodicals.karazin.ua/cscs/article/view/21039/19745 [In Ukrainian]
Sichkar, M., & Pavlova, L. (2024). A short survey of the capabilities of Next Generation firewalls. Computer Science and Cybersecurity, (1), 28-33. Retrieved from https://periodicals.karazin.ua/cscs/article/view/23090
Sichkar, M., & Malakhov, S. Generalization of features of known means of network shielding. Proceedings of the XXI International Scientific and Practical Conference. Sofia, Bulgaria. 2024. https://isg-konf.com/category/archiv-conference-rub/ [In Ukrainian]
Kokhanovska, T., Narezhny, O., & Dyachenko, O. (2020). Exploring the capabilities of Honeypot technology. Computer Science and Cybersecurity, 1(1), 33-42 https://doi.org/10.26565/2519-2310-2020-1-03 [In Ukrainian]
Mykhaylenko D., Nemtsev M. Peculiarities of the technology of network traps as a tool of active protection and analysis of the actions of the attacking party. Proceedings of the XXI International Scientific and Practical Conference. Melbourne, Australia. 2023. Pp. 483-487. Available at: https://doi.org/10.46299/ISG.2023.1.21 [In Ukrainian]
John Mallery, & Jason Zann (2007). Your company's secure network. (E. Lindemann, translated from English). - M.: NT Press [In Ukrainian]
Rondalev, D., Melkozyorova, O., & Narezhniy, O. (2019). Peculiarities of the operation of the corporate inter-network screen and the issue of interaction with the IDS system. Computer Science and Cyber Security, (3), 11-21. https://periodicals.karazin.ua/cscs/article/view/15614/14707 [In Ukrainian]
FireWall. URL: http://surl.li/tuggo
Who Invented the Firewall? History, Types and Generations of Firewall. 28th September 2023 by Manish Sahay URL: https://www.thepcinsider.com/who-invented-firewall-history evolution-typesgenerations/
What Is a Firewall? URL: http://surl.li/fdtbp
Next-Generation Firewalls. URL: https://www.paloaltonetworks.com/network-security/next-generationfirewall
Types of Firewalls: Know Which One Is Best for Your Network By John Villanueva / May 19, 2022. https://techgenix.com/types-of-firewalls
Information Technology Gartner Glossary. https://www.gartner.com/en/information-technology/glossary/next-generation-firewalls-ngfws
Yaremchuk, K., Voskoboynikov, D., & Melkozyorova, O. (2022). Modern threats and ways to secure web applications. Computer Science and Cybersecurity, (2), 28-34. https://periodicals.karazin.ua/cscs/ article/view/21038/19744 [In Ukrainian]
What is a Next-Generation Firewall (NGFW)? URL: https://www.zenarmor.com/docs/network-security-tutorials/next-generation-firewall
Top Next-Generation Firewall (NGFW) Software By Jenna Phipps July 19, 2022. URL: https://www.cioinsight.com/security/ngfw-software/#What-is-a-next-generation-firewall
What are the Types of Firewalls? URL: https://www.zenarmor.com/docs/network-security-tutorials/what-is-firewall
Mykhaylenko, D., Chorna, T. & Malakhov, S. The use of AI capabilities in the implementation of Static and Dynamic Honeypot to improve the parameters of protection of information resources. Technologies, tools and strategies for the implementation of scientific research: materials of the IV International Scientific Conference, (p. 54-57). October 7, 2022. Sumy, Ukraine: MCND. https://doi.org/10.36074/mcnd-07.10.2022 [In Ukrainian]
How do firewalls for mobile devices differ from traditional firewalls? https://www.xcel.com/how-dofirewalls-for-mobile-devices-differ-from-traditional-firewalls/
How mobile firewalls protect against unique threat vectors. URL: http://surl.li/tugix
Copyright (c) 2024 Computer Science and Cybersecurity
This work is licensed under a Creative Commons Attribution 4.0 International License.