Show simple item record

dc.contributor.authorArnott, Reeceen_NZ
dc.date.available2011-04-07T03:12:37Z
dc.date.copyright2002-08-21en_NZ
dc.identifier.citationArnott, R. (2002, August 21). A review of current firewall technologies (Dissertation, Master of Science). Retrieved from http://hdl.handle.net/10523/1286en
dc.identifier.urihttp://hdl.handle.net/10523/1286
dc.description.abstractAs corporations become more reliant on Internet based resources, the security of the corporation from Internet based attacks becomes more and more important. One of prime technologies that allow the corporation to have increased security between the internal network and the Internet is that of a firewall. A firewall is a filtering system that grants the firewall administrator the ability to create certain filter rules that determine what kind of traffic is allowed to cross the firewall. This paper examines the many different types of filtering that can be applied to traffic that goes through a firewall and how these have been implemented in practice. The actual filtering is only part of what a firewall must do; the firewall must also be able to report back to the firewall administrator various items of information, such as any blocked traffic. Seven different firewall products are examined to see how the different design decisions the various vendors have made affect the implementation of certain filtering functionality. This paper also examines the logging functionality of the firewalls, as this is the main reporting mechanism that the firewall administrator will use. Much of the development of firewalls has been driven by the ‘needs’ of customers as perceived by firewall developers. This has lead to some very advanced features in some areas but significant gaps in some other areas. This paper attempts to examine some of these advanced features and highlight some of the gaps that need more research and development.en_NZ
dc.format.mimetypeapplication/pdf
dc.subjectFirewallen_NZ
dc.subjectadministratoren_NZ
dc.subjectreporting mechanism,en_NZ
dc.subject.lcshT Technology (General)en_NZ
dc.subject.lcshQA76 Computer softwareen_NZ
dc.titleA review of current firewall technologiesen_NZ
dc.typeDissertationen_NZ
dc.description.versionUnpublisheden_NZ
otago.bitstream.pages195en_NZ
otago.date.accession2006-02-09en_NZ
otago.schoolInformation Scienceen_NZ
thesis.degree.disciplineInformation Scienceen_NZ
thesis.degree.nameMaster of Science
thesis.degree.grantorUniversity of Otagoen_NZ
thesis.degree.levelMasters Dissertationsen_NZ
otago.openaccessOpen
dc.identifier.eprints255en_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.referencesCarroll, Lewis “Through the Looking Glass and what Alice found there” Purnell and Sons Ltd. 1871 Cooper, Simon, Chapman, D. Brent, and Zwicky, Elizabeth D. “Building Internet Firewalls” 2nd Edition, O’Reilly and Associates, 2000, ISBN 1-56592-871-7 http://www.checkpoint.com/cvpopenspec/CVPOpenSpecification.pdf The CVP Open Specification Last Accessed 24/2/2002 http://www.franken.de/kongress/00/flat4/index.htm The NetFilter Framework in Linux 2.4 Last Accessed 19/9/2001 http://www.eeye.com/html/Databases/software/nmapNT/nmapNT.zip NmapNT Last Accessed 1/11/2001 http://squid-docs.sourceforge.net/latest/html/book1.htm Squid Users Manual Last Accessed 21/9/2001 http://squid-cache.org/Doc/FAQ/FAQ.htm Squid FAQ Last Accessed 21/9/2001 http://www.squid-cache.org/Scripts/ Squid Cache Logfile Analysis Scripts Last Accessed 21/9/2001 http://www.squid-cache.org/related-software.html Squid Related Software Last Accessed 24/9/2001 http://www.nstalker.com/stealth.php Stealth at N-Stalker, Inc. Last Accessed 1/11/2001 http://linux20321.dn.net/manual/tinypf/toc.htm Tiny Personal Firewall Help Files Last Accessed 23/5/2001 http://ftp.ldproxy.com/maniac/books/oreilly-tcpip.zip “TCP/IP Administration” Craig Hunt, 2nd Edition, O’Reilly and Associates,1997 ISBN 1-5652-322-7, Online Version Last Accessed 5/8/2001 http://www.linuxdoc.org/HOWTO/mini/TransparentProxy.html Transparent Proxy with Squid mini-HOWTO Last Accessed 24/9/2001 http://packetstormsecurity.org/DoS/udpflood.zip UDP Flood Last Accessed 28/1/2002 http://www.tinysoftware.com/ftp/winroute/wrp41en.pdf WinRoute Pro Manual Last Accessed 24/7/2001 http://www.zonelabs.com/services/support_za_all_faq.htm ZoneAlarm Frequently Asked Questions Last Accessed 14/5/2001 http://www.rfc.net/ Request For Comments (RFC) Homepage Last Accessed 5/7/2002 http://www.theregister.co.uk/content/archive/18029.html Win-NT/IIS admins made April Fools by hackers Last Accessed 5/7/2002 http://compnetworking.about.com/library/reviews/aatpfirewalls_ personal.htm?PM=n10121801b Personal Firewalls - Computer Networking Top Picks Last Accessed 5/7/2002 http://www.paybackproductions.com/windows/portscanners/superscanv206.zip SuperScan Version 2.06 Last Accessed 5/7/2002 http://grc.com/lt/bidresponse.htm BlackICE Latest Response Last Accessed 6/7/2002 http://grc.com/lt/scoreboard.htm LeakTest ScoreBoard Last Accessed 6/7/2002 http://www.theregister.co.uk/content/56/25945.html GamesSpy and KaZaA infected by viruses Last Accessed 6/7/2002 http://www.ritlabs.com/tinyweb/ TinyWEB server Last Accessed 12/3/2001 http://www.jgaa.com/software/warftpd/index.htm War FTP Daemon Last Accessed 14/1/2001 http://www.ftpx.com/ FTP Explorer Last Accessed 14/1/2002 http://webopedia.lycos.com/TERM/S/stateful_inspection.html Stateful Inspection Definition Last Accessed 13/7/2002 http://www.rocketdownload.com/Details/Inte/packetby.htm PacketBoy at Rocket Download Last Accessed 12/3/2001 http://www.icewarp.com/Download/ Merak Mail Server 4.4.2 Trial Version Download Last Accessed 15/07/2002 http://www.pmail.com/downloads.htm Pegasus Email Client Downloaden_NZ
 Find in your library

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record