Operating firewalls outside the LAN perimeter

R. N. Smith, S. Bhattacharya
{"title":"Operating firewalls outside the LAN perimeter","authors":"R. N. Smith, S. Bhattacharya","doi":"10.1109/PCCC.1999.749478","DOIUrl":null,"url":null,"abstract":"Firewalls are well known for their task of securing the enterprise intranet from untrusted users attempting to gain access. The concept of firewalls got its start when routers began to be used to balance network load. The effort to balance network traffic load at the transport level was extended to the server operating system where application proxy service and application level filtering is provided. Firewalls allow selected communications data to pass from one side of the corporate network perimeter to the other side. Since the firewall is the primary entry point to a corporate LAN from the Internet, the firewall frequently comes under attack by hackers and crackers. One form of attack is \"denial-of-service\". \"Denial-of-service\" attacks are easier to detect than are attacks that allow the attacker through the firewall on a valid password that they obtained by performing social engineering. Spamming the corporate email system is one form of \"denial-of-service\" attack, while many other forms simply flood the firewall with useless packets to prevent other authorized users from gaining access through the firewall. The paper presents a plan to place firewalls outside the corporate network boundaries, into the Internet. By having firewalls out in the Internet acting as agents for the corporations we expect to see attackers stopped closer to their source gateway. This changes the firewall task from a defensive mode to an offensive one. By having firewalls working together to seek out and locate or block the attacker at the source gateway, we gain several benefits. The paper proposes that the gateway protocol be modified to include this filtering function.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PCCC.1999.749478","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Firewalls are well known for their task of securing the enterprise intranet from untrusted users attempting to gain access. The concept of firewalls got its start when routers began to be used to balance network load. The effort to balance network traffic load at the transport level was extended to the server operating system where application proxy service and application level filtering is provided. Firewalls allow selected communications data to pass from one side of the corporate network perimeter to the other side. Since the firewall is the primary entry point to a corporate LAN from the Internet, the firewall frequently comes under attack by hackers and crackers. One form of attack is "denial-of-service". "Denial-of-service" attacks are easier to detect than are attacks that allow the attacker through the firewall on a valid password that they obtained by performing social engineering. Spamming the corporate email system is one form of "denial-of-service" attack, while many other forms simply flood the firewall with useless packets to prevent other authorized users from gaining access through the firewall. The paper presents a plan to place firewalls outside the corporate network boundaries, into the Internet. By having firewalls out in the Internet acting as agents for the corporations we expect to see attackers stopped closer to their source gateway. This changes the firewall task from a defensive mode to an offensive one. By having firewalls working together to seek out and locate or block the attacker at the source gateway, we gain several benefits. The paper proposes that the gateway protocol be modified to include this filtering function.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在局域网外围操作防火墙
众所周知,防火墙的任务是保护企业内部网,防止不受信任的用户试图访问。当路由器开始被用来平衡网络负载时,防火墙的概念就开始了。在传输级别平衡网络流量负载的工作扩展到服务器操作系统,其中提供了应用程序代理服务和应用程序级别过滤。防火墙允许选定的通信数据从公司网络边界的一端传递到另一端。由于防火墙是从Internet进入公司LAN的主要入口点,因此防火墙经常受到黑客和破解者的攻击。攻击的一种形式是“拒绝服务”。“拒绝服务”攻击比允许攻击者使用他们通过执行社会工程获得的有效密码通过防火墙的攻击更容易检测。向公司电子邮件系统发送垃圾邮件是“拒绝服务”攻击的一种形式,而许多其他形式只是用无用的数据包淹没防火墙,以防止其他授权用户通过防火墙获得访问权限。本文提出了一种将防火墙置于公司网络边界之外,进入Internet的方案。通过在互联网上设置防火墙作为公司的代理,我们期望看到攻击者在其源网关附近被阻止。将防火墙任务从防御模式转换为攻击模式。通过让防火墙一起工作来查找、定位或阻止源网关上的攻击者,我们可以获得几个好处。本文建议修改网关协议,使其包含此过滤功能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An optical layer protocol for lightpath management in WDM networks PDATS II: improved compression of address traces An adaptive distributed channel allocation strategy for mobile cellular networks Validation of Turandot, a fast processor model for microarchitecture exploration Sectored renaming for superscalar microprocessors
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1