Comparing Firewall Technologies

نویسنده

  • Per Thorsheim
چکیده

In early January 2001, a new web page was launched. It was named Netscan, and the creators had done quite a bit of work prior to launching their Web site. Actually, the work was quite simple, but time-consuming. They had pinged the entire routed IPv4 address space; or to be more exact, they pinged every IP address ending with .0 or .255. For each PING sent, they expected one PING REPLY in return. And for each network that replied with more than one packet, they counted the number of replies and put the data into a database. All networks that did reply with more than one packet for each packet sent were considered to be an amplifier network. After pinging the entire Internet (more or less), they published on their Web site a list of the 1024 worst networks, including the e–mail address for the person responsible for the IP address and its associated network. The worst networks were those networks that gave them the highest number of replies to a single PING, or the best amplification effect. The security problem here is that it is rather easy to send a PING request to a network, using a spoofed source IP address. And when the recipient network replies, all those replies will be sent to the source address as given in the initial PING. As shown in Exhibit 1, the attacker can P A Y O F F I D E A

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Overview of Firewall Technologies

The increasing complexity of networks, and the need to make them more open due to the growing emphasis on and attractiveness of the Internet as a medium for business transactions, mean that networks are becoming more and more exposed to attacks, both from without and from within. The search is on for mechanisms and techniques for the protection of internal networks from such attacks. One of the...

متن کامل

The SQL Injection and Signature Evasion

Network firewalls, IPS, and even some dedicated Web application firewall technologies attempt to identify SQL injection via traditional signature-based protections. Signature protections attempt to identify and block SQL injection-related text patterns within Web traffic flows. Unfortunately, real world experience has proven that reliance upon signatures alone is not enough to defeat SQL Inject...

متن کامل

A Formal Approach To Firewalls Testing Techniques

Traditional technologies of firewall testing are overlooked. A new formalized approach is presented. Recommendations on optimization of test procedures are given.

متن کامل

Development of Smart Firewall Load Balancing Framework for Multiple Firewalls with an Efficient Heuristic Firewall Rule Set

Firewalls are the devices that we are used to protect data. It might be configured to allow certain devices or applications to access our network. The Firewalls are termed as stateful devices. Traditional firewalls typically need to inspect each packet to ensure that it adheres to the policy that has been configured or not, and then perform the necessary action associated to that particular rul...

متن کامل

Ignoring the Great Firewall of China

The so-called “Great Firewall of China” operates, in part, by inspecting TCP packets for keywords that are to be blocked. If the keyword is present, TCP reset packets (viz: with the RST flag set) are sent to both endpoints of the connection, which then close. However, because the original packets are passed through the firewall unscathed, if the endpoints completely ignore the firewall’s resets...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007