Open Access   Article Go Back

A Framework for Reducing the Cost of the Firewall

Mohammed Alwajeeh1 , Saleh Noman Alassali2 , Yasser Ali Alahmadi3

  1. Dept. Computer Science, Saba Region University, Marib, Yemen.
  2. Dept. Computer Science, Saba Region University, Marib, Yemen.
  3. Dept. Computer Science, Saba Region University, Marib, Yemen.

Section:Research Paper, Product Type: Journal Paper
Volume-11 , Issue-4 , Page no. 1-6, Apr-2023

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v11i4.16

Online published on Apr 30, 2023

Copyright © Mohammed Alwajeeh, Saleh Noman Alassali, Yasser Ali Alahmadi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mohammed Alwajeeh, Saleh Noman Alassali, Yasser Ali Alahmadi, “A Framework for Reducing the Cost of the Firewall,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.1-6, 2023.

MLA Style Citation: Mohammed Alwajeeh, Saleh Noman Alassali, Yasser Ali Alahmadi "A Framework for Reducing the Cost of the Firewall." International Journal of Computer Sciences and Engineering 11.4 (2023): 1-6.

APA Style Citation: Mohammed Alwajeeh, Saleh Noman Alassali, Yasser Ali Alahmadi, (2023). A Framework for Reducing the Cost of the Firewall. International Journal of Computer Sciences and Engineering, 11(4), 1-6.

BibTex Style Citation:
@article{Alwajeeh_2023,
author = {Mohammed Alwajeeh, Saleh Noman Alassali, Yasser Ali Alahmadi},
title = {A Framework for Reducing the Cost of the Firewall},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2023},
volume = {11},
Issue = {4},
month = {4},
year = {2023},
issn = {2347-2693},
pages = {1-6},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5549},
doi = {https://doi.org/10.26438/ijcse/v11i4.16}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v11i4.16}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5549
TI - A Framework for Reducing the Cost of the Firewall
T2 - International Journal of Computer Sciences and Engineering
AU - Mohammed Alwajeeh, Saleh Noman Alassali, Yasser Ali Alahmadi
PY - 2023
DA - 2023/04/30
PB - IJCSE, Indore, INDIA
SP - 1-6
IS - 4
VL - 11
SN - 2347-2693
ER -

VIEWS PDF XML
285 247 downloads 78 downloads
  
  
           

Abstract

Today, the world has become like a small village, and the success of any institution has become closely related to communication with the outside world through the Internet. As each institution needs to exchange information from one place to another that exposes sensitive information to danger and spread. Such institutions require the existence of mechanisms to protect this information. The firewall plays an important role in protecting information from unauthorized access. However, the available firewalls are not suitable for all institutions due to their high cost. This paper proposes a micro-firewall for reducing the cost of firewall by avoiding the additional services while maintaining the security, and thus the proposed micro-firewall will suitable the small and medium institutions. The proposed micro-firewall uses two computers, one of them is connected with the internet and the other is connected with the local network, the communication between the two computers is done by using the server and client protocols. The role of the computer connected with the internet is to receive the request from the external user who want access the internal network and verify the identity of the user if he/she is an authorized user or not. If yes it sends the request to the computer connected with the internal network, unless the request is rejected. The role of internal computer is similar to external computer but for internal user. The proposed micro-firewall was compared with other firewalls in terms of the cost reduction. The results showed that the cost of proposed micro-firewall has reduced compared with the cost of the other firewalls.

Key-Words / Index Term

firewall, client, server, agent, proxy, packet filtering, user filtering, network security.

References

[1] N. Sultana, "A Framework of Wireless Network Security Threats: Solution for Various Information Security Problems," 2019.
[2] K. C. Patel and P. Sharma, "A Review paper on pfsense-an Open source firewall introducing with different capabilities & customization," IJARIIE, vol. 3, pp. 2395-4396, 2017.
[3] N. Rawindaran, A. Jayal, E. Prakash, and C. Hewage, "Cost benefits of using machine learning features in NIDS for cyber security in UK small medium enterprises (SME)," Future Internet, vol. 13, p. 186, 2021.
[4] C. Akturk and C. Cubukcu, "A Decision Making Model Proposal for Firewall Selection," KSII Transactions on Internet and Information Systems (TIIS), vol. 15, pp. 3588-3607, 2021.
[5] T. Jain and N. Jain, "Framework for Web application vulnerability discovery and mitigation by customizing rules through ModSecurity," in 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), 2019, pp. 643-648.
[6] M. Mihalos, S. Nalmpantis, and K. Ovaliadis, "Design and Implementation of Firewall Security Policies using Linux Iptables," Journal of Engineering Science & Technology Review, vol. 12, 2019.
[7] R. Datta, S. Choi, A. Chowdhary, and Y. Park, "P4guard: Designing p4 based firewall," in MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), pp. 1-6, 2018.
[8] A. Sujarwo and J. Tan, "Enterprise firewall virtualization design," in MATEC Web of Conferences, p. 03004, 2018.
[9] J. Surana, K. Singh, N. Bairagi, N. Mehto, and N. Jaiswal, "Survey on next generation firewall," International Journal of Engineering Research and Development, vol. 5, pp. 984-988, 2017.
[10] D. Sampaio and J. Bernardino, "Evaluation of Firewall Open Source Software," in WEBIST, pp. 356-362, 2017.
[11] J. Jeong, J. Seo, G. Cho, H. Kim, and J.-S. Park, "A framework for security services based on software-defined networking," in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp. 150-153, 2015.
[12] M. Liu, W. Dou, S. Yu, and Z. Zhang, "A decentralized cloud firewall framework with resources provisioning cost optimization," IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 621-631, 2014.
[13] M. Strebe and C. Perkins, Firewalls 24seven: Sybex, 2000.
[14] G. Bastien and C. Degu, CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide (CCSP Self-Study): Cisco Press, 2003.
[15] D. L. Shinder and M. Cross, Scene of the Cybercrime: Elsevier, 2008.
[16] J. R. Vacca, Network and system security: Elsevier, 2013.
[17] P. B. Ambhore and K. A. Wankhade, "Proxy Server FOR Intranet Security."
[18] C. L. Schuba, "On the modeling, design, and implementation of firewall technology," Purdue University, 1997.
[19] S. Pinzon, "Top 10 threats to SME data security," WatchGuard Technologies, 2008.
[20] A. Malmgren and S. Persson, "A comparative study of Palo Alto Networks and Juniper Networks next-generation firewalls for a small enterprise network," ed, 2016.
[21] K. Tam, M. H. H. Salvador, K. McAlpine, R. Basile, B. Matsugu, and J. More, UTM Security with Fortinet: Mastering FortiOS: Newnes, 2012.
[22] A. E.-M. A. El-Bawab, Untangle Network Security: Packt Publishing Ltd, 2014.