Sei sulla pagina 1di 1

International Journal of Scientific and Research Publications, Volume 6, Issue 4, April 2016 506

ISSN 2250-3153
reduce the cost of obtaining public addresses for every gateways Packets received or leaving cannot access
computer. But this research does not concern about services for which there is no proxy. The problem of this
firewall capacity therefore in the high security firewall paper is that it does not focus on network capacity. So the
research it will concern about the firewall capacity which performance will be decreased [12].
will help the people to choose the most suitable firewall to This research mainly focuses on the firewall capacity,
prevent network attacks [8]. advantages, and disadvantages of it. High firewall capacity
This research mainly focuses on firewall techniques helps the system to reduce the cost of replacing the low
like packet filtering and circuit level gateways. Circuit capacity. This paper is disadvantageous as it focuses on
level gateways monitor TCP handshaking between packets only one packet firewall technique. Therefore, they are not
to determine whether a requested session is legitimate. In considered as a secured firewall. And also it may leave the
packet filtering only the authorized data packets are passed network vulnerable or incorrectly configured. There are no
through the firewall. This research is disadvantageous as it any packet filtering techniques, which packet passing
only focuses about few firewall techniques. Therefore, through a firewall is compared to a set of rules before it is
high security firewall system will focus on having proxy allowed to pass through. So this a very big drawback for
services information packets would not pass through a the system [13].
proxy and proxy act as an intermediary computer.
Therefore, this prevents direct connections and packet
transfer between either sides of the firewall which makes III. SOLUTION
harder for intruders to find the location of network where Research team has discussed a conceptualized paper
the packet is coming from [9]. on high secure network combining firewall technologies
Online examination system is used to provide exam and capacity together. In a network, security is most
online for remote candidates. The system is consisting of a important factor. In organizations, network is used to share
web based server with a database facility. Database it their confidential information and secret methodologies.
contains User information and authentication for the The lack of innovative security standards, hackers can
Examination. Firewall technologies are used to make a hack the system and steal their private and confidential
secure system for online examination. Virtual Private details. Therefore, most of the organizations use firewall
Network (VPN) and NAT (Network Address Translation) as a security system. There are few firewall technologies
these type of technologies is used to build this system. A to provide security in the network. Those firewall
Virtual Private Network (VPN) is a network technology technologies are packet filtering, network address
that creates a secure network connection over a public translation, circuit level gateways, virtual private network,
network such as the Internet or a private network owned proxy services, application proxies and application level
by a service provider. In order to gain access to the private gateways. Firewall capacity is one of the factors that
network, a user must be authenticated using a unique should give the priority in order to speed the performance
identification and a password. An authentication token is of the firewall.
often used to gain access to a private network through a Firewall performances are sometimes depending on
personal identification number (PIN) that a user must enter the firewall capacity. High capacity firewalls can perform
[10]. better. Most of high capacity firewall is expensive. The
Sharma, Bhisham, and Karan Bajaj state that packet Proposed research will be focusing on high secured
filtering is the main technology that this research focuses network using firewall capacity and combination of
on in order to prevent unauthorized traffic form network. firewall technologies such as packet filtering, network
The filtering decision is taken according to a set of ordered address translation, virtual private network and proxy
filtering rules written based on predefined security policy services. When advanced secured network is built using
requirements. This research mostly considers about traffic these technologies, the firewall capacity can be increased
of network and how to make secure network without any in order to increase the performance of the firewall,
unauthorized access [11]. otherwise low capacity firewalls can slow down the
This report will provide readers with a resource for performance. Then this will affect the security of network.
understanding firewall design Principles used in network Therefore, Research team decided to combine few firewall
security. Firewalls fall into four broad categories: packet technologies together in order to improve the security of a
filters, circuit level Gateways, application level gateways particular network.
and state full multilayer inspection firewalls. In a packet
filtering firewall, each packet is compared to a set of rules 3.1. Reason for consideration of these technologies
before it is forwarded. The advantages of Packet filtering Packet filtering technique, Network will identify
firewalls are low cost, have only a small effect on the packet which is authorized and other unauthorized packet
network performance, and do not require client computers will be dropped. Therefore, this technology is more
to be configured in any particular way. Circuit level important. Network address translation consider about
gateways examine each connection setup to ensure that it public IP Addresses which are allocated in specific
follows legitimate TCP handshaking. Application level network, then hacker cannot take information using

www.ijsrp.org

Potrebbero piacerti anche