Asif Siddiqui;Bhaskar P. Rimal;Martin Reisslein;Yong Wang
{"title":"家庭网络统一威胁管理 (UTM) 系统调查","authors":"Asif Siddiqui;Bhaskar P. Rimal;Martin Reisslein;Yong Wang","doi":"10.1109/COMST.2024.3382470","DOIUrl":null,"url":null,"abstract":"Home networks increasingly support important networked applications with limited professional network administration support, while sophisticated attacks pose enormous security risks for networked applications. A Unified Threat Management (UTM) system strives to comprehensively protect a network by providing firewall, intrusion detection and prevention, as well as antibot protection in an integrated, easy-to-configure manner. Previous surveys have extensively covered the individual components of a UTM system, i.e., there is extensive literature on firewall surveys, intrusion detection and prevention surveys, and antibot protection surveys. Importantly, the previous surveys covered these protection services separately, without considering their integration (however, this integration is critical for comprehensive home network protection). In contrast, the present survey covers for the first time home network UTM systems, i.e., the integrated network security services provided by a UTM system for a home network. This UTM survey is organized according to the UTM components, i.e., we comprehensively survey the firewall methods, the intrusion detection and prevention methods, as well as the antibot protection methods that are suitable for a UTM system for a home network. Throughout, we view these methods from the perspective of integration into a UTM system with limited computational resources and limited network administration support. Our survey includes the protection capabilities, as well as the design and deployment aspects and software/hardware limitations of available off-the-shelf and open-source UTM systems. We find that effective integrated home network protection where the UTM system components synergistically support each other while operating with limited computational resources and network administration support still requires extensive future research and development.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2459-2509"},"PeriodicalIF":34.4000,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Survey on Unified Threat Management (UTM) Systems for Home Networks\",\"authors\":\"Asif Siddiqui;Bhaskar P. Rimal;Martin Reisslein;Yong Wang\",\"doi\":\"10.1109/COMST.2024.3382470\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Home networks increasingly support important networked applications with limited professional network administration support, while sophisticated attacks pose enormous security risks for networked applications. A Unified Threat Management (UTM) system strives to comprehensively protect a network by providing firewall, intrusion detection and prevention, as well as antibot protection in an integrated, easy-to-configure manner. Previous surveys have extensively covered the individual components of a UTM system, i.e., there is extensive literature on firewall surveys, intrusion detection and prevention surveys, and antibot protection surveys. Importantly, the previous surveys covered these protection services separately, without considering their integration (however, this integration is critical for comprehensive home network protection). In contrast, the present survey covers for the first time home network UTM systems, i.e., the integrated network security services provided by a UTM system for a home network. This UTM survey is organized according to the UTM components, i.e., we comprehensively survey the firewall methods, the intrusion detection and prevention methods, as well as the antibot protection methods that are suitable for a UTM system for a home network. Throughout, we view these methods from the perspective of integration into a UTM system with limited computational resources and limited network administration support. Our survey includes the protection capabilities, as well as the design and deployment aspects and software/hardware limitations of available off-the-shelf and open-source UTM systems. We find that effective integrated home network protection where the UTM system components synergistically support each other while operating with limited computational resources and network administration support still requires extensive future research and development.\",\"PeriodicalId\":55029,\"journal\":{\"name\":\"IEEE Communications Surveys and Tutorials\",\"volume\":\"26 4\",\"pages\":\"2459-2509\"},\"PeriodicalIF\":34.4000,\"publicationDate\":\"2024-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Communications Surveys and Tutorials\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10480701/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Communications Surveys and Tutorials","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10480701/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Survey on Unified Threat Management (UTM) Systems for Home Networks
Home networks increasingly support important networked applications with limited professional network administration support, while sophisticated attacks pose enormous security risks for networked applications. A Unified Threat Management (UTM) system strives to comprehensively protect a network by providing firewall, intrusion detection and prevention, as well as antibot protection in an integrated, easy-to-configure manner. Previous surveys have extensively covered the individual components of a UTM system, i.e., there is extensive literature on firewall surveys, intrusion detection and prevention surveys, and antibot protection surveys. Importantly, the previous surveys covered these protection services separately, without considering their integration (however, this integration is critical for comprehensive home network protection). In contrast, the present survey covers for the first time home network UTM systems, i.e., the integrated network security services provided by a UTM system for a home network. This UTM survey is organized according to the UTM components, i.e., we comprehensively survey the firewall methods, the intrusion detection and prevention methods, as well as the antibot protection methods that are suitable for a UTM system for a home network. Throughout, we view these methods from the perspective of integration into a UTM system with limited computational resources and limited network administration support. Our survey includes the protection capabilities, as well as the design and deployment aspects and software/hardware limitations of available off-the-shelf and open-source UTM systems. We find that effective integrated home network protection where the UTM system components synergistically support each other while operating with limited computational resources and network administration support still requires extensive future research and development.
期刊介绍:
IEEE Communications Surveys & Tutorials is an online journal published by the IEEE Communications Society for tutorials and surveys covering all aspects of the communications field. Telecommunications technology is progressing at a rapid pace, and the IEEE Communications Society is committed to providing researchers and other professionals the information and tools to stay abreast. IEEE Communications Surveys and Tutorials focuses on integrating and adding understanding to the existing literature on communications, putting results in context. Whether searching for in-depth information about a familiar area or an introduction into a new area, IEEE Communications Surveys & Tutorials aims to be the premier source of peer-reviewed, comprehensive tutorials and surveys, and pointers to further sources. IEEE Communications Surveys & Tutorials publishes only articles exclusively written for IEEE Communications Surveys & Tutorials and go through a rigorous review process before their publication in the quarterly issues.
A tutorial article in the IEEE Communications Surveys & Tutorials should be designed to help the reader to become familiar with and learn something specific about a chosen topic. In contrast, the term survey, as applied here, is defined to mean a survey of the literature. A survey article in IEEE Communications Surveys & Tutorials should provide a comprehensive review of developments in a selected area, covering its development from its inception to its current state and beyond, and illustrating its development through liberal citations from the literature. Both tutorials and surveys should be tutorial in nature and should be written in a style comprehensible to readers outside the specialty of the article.