ChapterPDF Available

Securing a Network: How Effective Using Firewalls and VPNs Are?

Authors:

Abstract and Figures

With the tremendous amount of increase in cyber threats on the Internet, the security of data traveling over a network has become a significant concern for all the netizens. As a result, a large number of Internet users have started using firewalls and VPN (Virtual Private Network) to ensure more protection for their data on the go. Though mostly considered as defenders of our network security, sometimes firewalls and VPNs can also pose some serious threats to its users. Our research focuses on addressing these security flaws by providing a specific illustration of the working principles and performance of the firewalls and VPNs, including the technologies behind them and their benefits, significant potential risks it may bring due to some considerable loopholes in their architecture, and the possible solutions to those security issues. We hope that our research will bring a better understanding of these security issues and their solution to help users and organizations to deal with these security threats and risks in a better way.
Content may be subject to copyright.
Securing a Network: How Effective Using
Firewalls and VPNs Are?
Sun Jingyao, Sonali Chandel
(&)
, Yu Yunnan, Zang Jingji,
and Zhang Zhipeng
New York Institute of Technology, Nanjing, China
{jsun19,schandel,yyu18,jzang,Zzhang36}@nyit.edu
Abstract. With the tremendous amount of increase in cyber threats on the
Internet, the security of data traveling over a network has become a signicant
concern for all the netizens. As a result, a large number of Internet users have
started using rewalls and VPN (Virtual Private Network) to ensure more
protection for their data on the go. Though mostly considered as defenders of
our network security, sometimes rewalls and VPNs can also pose some serious
threats to its users. Our research focuses on addressing these security aws by
providing a specic illustration of the working principles and performance of the
rewalls and VPNs, including the technologies behind them and their benets,
signicant potential risks it may bring due to some considerable loopholes in
their architecture, and the possible solutions to those security issues. We hope
that our research will bring a better understanding of these security issues and
their solution to help users and organizations to deal with these security threats
and risks in a better way.
Keywords: Firewall VPN Network security
1 Introduction
The importance of the Internet and its security was never as great of a concern as it is
now because of the amount of data that is exchanged through it 24 7. Plenty of
threats and risks exist in the cyber world that can affect the network security in a big
way. Hacking is one of the most common cyber threats to a network as it allows the
hackers aka malicious users to manipulate and attack the loopholes of vulnerable
networks and take control of it. Besides the external damage, which mainly reects the
destruction caused by hackers by mostly using malware, virus or DDoS attacks, the
threat of resource openness because of using the computer network in a shared envi-
ronment, cannot be ignored at all. The exponential growth of security risks and dangers
that exists outside of a network in the present times can strictly conrm the necessity
for people to use and study the rewalls and VPNs so that the attacks can be prevented
and detected, and the network can be protected from getting damaged [1].
Firewall is a technology that is used to control the degree of interconnection
between different networks. It can prevent the external network from accessing the
internal network equipment and network resources using unauthorized ways. This
means a rewall can protect internal network and system from potential threats of a
©Springer Nature Switzerland AG 2020
K. Arai and R. Bhatia (Eds.): FICC 2019, LNNS 70, pp. 10501068, 2020.
https://doi.org/10.1007/978-3-030-12385-7_71
schandel@nyit.edu
network attack. This technology fully combines the potential of hardware and software
in a computer network and realizes active ltering and screening of potential threats
and risks to a network. A rewall usually is the rst step to intercept an external attack
to accomplish the adequate protection for computer network security [2]. Figure 1[3]
introduce the connection schematic of Firewall, Intranet, and the Internet. The essential
features and primary functions of Firewalls are shown in Table 1[3].
A VPN is a virtual encrypted tunnel between the user and a remote server operated
by a VPN service. All external Internet trafc is routed through this tunnel, so our data
becomes safe from the data hunters. On the other hand, the IP address of the VPN
server becomes the users IP address, enabling them to hide their actual identity [4].
Firewalls are the gateways to ensure the security of the internal network and VPNs
are ways to access the internal network. There are always rewalls in the place where
there are VPNs. VPNs can be used with or without rewalls, but they are not rec-
ommended to be implemented without rewalls as their primary purpose is to secure
the network trafc. A VPN without a rewall makes VPNs encryption function use-
less. Using VPN with rewall further enhances the security of the Internet and network
in general.
Fig. 1. The connection schematic of a Firewall, Intranet, and Internet
Table 1. The basic features and main functions of a rewall
Basic features Main functions
All network data between the external and internal networks
must pass through the rewall
Firewall is a barrier to
network security
Only data ows that conform to security policies can pass
through a rewall
It can strengthen network
security strategy
It can monitor and audit
network access
The rewall itself should have powerful immunity against
attacks
It prevents leakage of
internal information
Securing a Network: How Effective Using Firewalls and VPNs Are? 1051
schandel@nyit.edu
This paper aims to provide a detailed study of the security issues and its solutions
that the users of a Firewall and a VPN should know. In this paper, we have proposed
some suggestions for the safety and security in using the Firewalls and VPNs based on
the literature survey that we did for our research. This paper is structured as follows:
Related work is mentioned in Sect. 2. In Sect. 3, an overview of the rewall and VPN
technologies has been discussed. Section 4introduces the security issues related to
using rewalls and VPNs. The most common threats and attacks in using rewalls and
VPNs are discussed in Sect. 5. Solutions for the most common security issues in using
rewalls and VPNs has been discussed in Sect. 6. In Sect. 7, the conclusions are
drawn, and future work has been mentioned.
2 Related Work
In the past, the authors of [1,3,26,30] focused on the security of rewalls and VPNs,
but they did not discuss anything regarding the attacks or threats on rewalls and
VPNs. [2] does not provide some specic methods about how to improve the security
issues of rewalls. The authors of [9] and [12] present just one case study and focus on
one aspect. [9] focuses on an example of a system using both Firewall and VPN. It
presents a case of two rewalls with the same conguration in the same network node,
which communicate with each other through a direct connection. [12] focuses only on
the deep packet inspection technology of rewall. Furthermore, paper [10] is an old
study that does not cover the recent problems and various attacks that happens in the
cyber world presently. Paper [13] also talks about one model without its realization. In
addition, some papers like [17,19,20,2426] only concentrate on one attack rather
than its relationship with the rewalls. The work done by us will not only analyze
rewalls and VPNs individually, but we will also compare them together to enhance
their abilities in providing more security. It also means that the security loopholes and
the solution will be related to both of them. We will analyze the better structure or
system concerning the latest products like Web Application Firewall, Secure Web
Gateway, and Next Generation Firewall to nd the reasons behind them for being
considered as safer than traditional rewalls and VPN setups.
3 The Working Principles of Firewalls and VPNs
3.1 The Working Principle of Firewalls
Firewall technology has been developing continuously since its birth. Various kinds of
rewalls with different structures and functions are built into a network for getting more
defense. Traditional rewall technology falls into three categories, and no matter how
sophisticated the implementation of a rewall is, it is ultimately based on the following
three technologies.
1052 S. Jingyao et al.
schandel@nyit.edu
3.1.1 Packet Filtering
The working principle behind the Packet ltering rewall can be called as a network
rewall because it works in the network layer. It usually decides whether to let the data
packets pass, by examining the address, protocols, and ports of each packet. Figure 2
shows the principles of Packet ltering. The packet lter can be divided into a static
packet lter and dynamic packet lter [5].
Static packet lter. Static packet lter technology is a traditional packet lter. It
decides whether these data packets can be passed according to the IP addresses of
these data packets. If attackers set their mainframe IP addresses as legal addresses,
they can quickly pass the static packet ltering rewall. Therefore, this kind of
rewall is not secure enough.
Dynamic packet lter. It can automatically apply to create or delete packet lter
rules according to dynamic practice application without administratorsinterven-
tion. However, the dynamic packet lter technology can only lter against datasIP
address instead of the legality of users. It also does not have log records to check
which brings enormous difculties to daily network security management. There-
fore, it has been replaced by a new technology called the Adaptive Proxy Protection
rewall.
3.1.2 Application Proxy
Application Proxy rewall is also called as an Application Gateway rewall. This
rewall participates in the entire process of a TCP connection through Proxy tech-
nology. The data packets sent from the inside are processed by the rewall to hide the
Intranet structure. Network security experts recognize this type of rewall as the most
secure rewall. Its core technology is the proxy server technology. The proxy server
refers to the program that represents the clients connection request on the server. When
the proxy server gets connection intentions from a client, they will verify the clients
request and then handle connection requests through the specic secure proxy
Fig. 2. The principle of packet ltering
Securing a Network: How Effective Using Firewalls and VPNs Are? 1053
schandel@nyit.edu
applications. The request is transferred to the real server, which then accepts the server
response. After further processing, the proxy will reply to the nal client who makes a
request. The proxy server plays the role of interconnecting the application of the
external network to the internal network [5].
Adaptive Proxy Firewall
Adaptive proxy is a revolutionary technology implemented recently in commercial
application rewalls. It combines the advantages of the safety of the Application Proxy
rewall and the high speed of packet ltering rewall and improves the performance of
the proxy rewall by ten times without losing the security.
3.1.3 Stateful Inspection
Stateful Inspection is an extension of the packet-by-packet ltering process, which
tracks individual ows, enabling policy checks that extend across a series of packets
[6]. It checks the handshakes in a communication network by exploiting detailed
information of the communication protocol. It detects malicious activities by moni-
toring packet-by-packet connection and predicting the next move based on what
happened. This makes it a more advanced tool than other rewalls [7]. These rewalls
maintain a table of open connections, inspecting the payload of some packets and
intelligently associating new connection requests with existing legitimate connections
[8]. With modern rewalls, network administrators can control the network trafcina
more ne-grained fashion.
3.2 The Working Principle of VPNs
The mainstream applications that claim to provide VPN services are using one of the
following three techniques [4]:
Proxy Server. A proxy server is like a courier service that is responsible for only
transcending the messages. The work of proxy servers is conducted in the HTTP
layer and the Socket layer in the Open System Interconnection (OSI) model under
most circumstances. Figure 3explains how proxy server functions.
Fig. 3. The working architecture of a proxy server
1054 S. Jingyao et al.
schandel@nyit.edu
IPSec. IP Security (IPSec) is the most common method used by the VPN appli-
cations. It works in the third layer called the Network layer of the OSI model.
SSH. An encrypted channel needs to be combined with the proxy server to over-
come the blocked network. The tool that is used to scale the blocked network called
SSH is, in fact, an SSH agent. In the TCP/IP 5-tier model, SSH is the security
protocol that applies to the application layer and the transport layer. SSH is a remote
shell, an application based on SSL. Although many people use SSH to transmit
data, they merely use the SSL proxy function of SSHD software to get this job
done.
3.3 Architecture of a System Using a Combination of Firewall and VPN
Figure 4shows a typical network security architecture based on the combination of
both rewall and VPN technology [9]. The system has a master node under which there
are large nodes and links between them. Under the big node, there are intermediate
nodes, and under the intermediate nodes, there are small nodes. The intermediate node
and the small node is only connected with its own upper and lower levels. Between
nodes, individual wire connections can also support other ways of connecting people,
such as wireless connections. Security between nodes ensures the safe transmission of
data through the virtual encryption channel between VPN array devices and VPN
receiver devices.
The entire network adopts a network management system to manage, control and
report congestion for various security devices, routers, switches and servers in the
network, as well as fault management. The network management system will monitor
equipment utilization, bandwidth utilization, packet loss rate, etc. Two rewalls with
the same conguration are used in the same network node, and they communicate with
each other through a direct connection. Under normal circumstances, one is working,
which is the primary, and the other is in the backup state.
Fig. 4. A typical network security architecture based on rewall and VPN technology
Securing a Network: How Effective Using Firewalls and VPNs Are? 1055
schandel@nyit.edu
High availability is achieved through heartbeatmode. A direct connection
between two rewalls of the same type creates the heartbeat line that uses xed interval,
master-slave equipment to exchange information. When the host accidentally crashes, or
network fails, hardware failure happens. Master-slave rewall switch is a working state
from the machine instead of the standard work of the host, to guarantee the regular use of
the network. Switching process does not require a human operator. They also do not
need the participation of other systems. The primary rewalls restore function will
automatically return the control to the rewall, to assure the safety of the network. By
deploying this network security system with rewall technology as the core, a VPN can
realize the secure exchange of condential information between nodes.
4 Security Issues in Using Firewalls and VPN
Even though rewalls and VPNs are used for protecting or mitigating the external
attacks on a network or a system, but they are not full proof. In this section, we will
discuss some of the shortcomings in both of these technologies.
4.1 Security Issues of Firewalls
With the increasing severity of network security issues and the continuous development
of security defense, shortcomings of rewalls in the security aspect have gradually
attracted much attention from security researchers and organizations. Due to the
existing loopholes in the rewall architecture, a series of attacks can quickly destroy a
network. Analyzing rewalls vulnerabilities and the attacks against it is of great
signicance to the development and improvement of rewall technology for complete
network security.
The most common security aws of rewalls are as follows:
Firewalls may sacrice some useful network services. Firewallseither in or
outfeature is bound to shut down some valuable ports due to security problems,
sacricing some helpful network services as well [10]. After the rewall receives
network packets at the network layer (including the following link layer), it matches
them one by one based on the rules. It then performs prearranged actions if they are
consistent, such as allowing or denying packet access. This creates a lot of dis-
comfort and challenges for the organizations and users alike to make sure that the
good packets are not misunderstood and blocked as bad ones.
Firewalls cannot protect against attacks from internal network users. Firewalls
are the outlet for information between different networks or network security
domains. It can control the ow of information in and out of the network according
to the set security policy. This prevents the illegal information from owing into the
protected network without affecting the regular access of the protected network to
the Internet. This feature of rewall determines that it can only lter packets
between internal and external networks but cannot process packets from within the
internal networks [11]. This makes it impossible to protect against attacks from
internal network users commonly known as insider threats.
1056 S. Jingyao et al.
schandel@nyit.edu
Firewalls are not secure against software or les with the virus. Firewall for
encrypted SSL stream of data is not visible. This means that the rewall cannot
quickly seize the SSL data ow and do the decryption. Therefore, it cannot stop the
attack of the application as well as cannot see the application rewalls encrypted
data [12]. The rewall can recognize and intercept attack data only when the
attacking behavior of the application layer matches the existing attacking behavior
of the database in the rewall.
Arewall cannot extend depth detection. It is impossible for a general rewall to
extend depth detection that is based on the data package without increasing network
performance accordingly. Profound detection capabilities for all network and
application trafc require unprecedented processing power to accomplish a large
number of computing tasks; including (1) SSL encryption/decryption function
(2) Complete two-way payload detection (3) Ensure the normalization of all
legitimate trafc (4) Extensive protocol performance. These tasks cannot run ef-
ciently on standard PC hardware [13].
The weaknesses of ve general kinds of rewalls are shown in Table 2[13].
4.2 Security Issues of VPNs
Any company or organization that implements a VPN to ensure their network security
still cannot ignore the risks and threats that can destroy or sabotage their network
without them even knowing or realizing it. The most common risks can be seen in
Table 3.
Table 2. The weaknesses of ve general kinds of rewalls
Firewalls Weaknesses in the security system
Packet ltering rewall Hard to congure
Status/dynamic detection rewall Delay in the network connection
Web application rewall Limited range of user system
Network address translation
rewall
Unable to mitigate the internal attacks and threats
Personal rewall Unable to monitor and control multiple
communication
Table 3. The risks involved in using a VPN
1 Securing against lateral network movement
2 Securing and connecting to cloud-based infrastructure
3 Blocking malicious insiders, over-privileged users, and compromised third-party access
4 Preventing malware from proliferating across the network
5Efciently integrating with business processes and identity management systems
Securing a Network: How Effective Using Firewalls and VPNs Are? 1057
schandel@nyit.edu
IPSec VPN: This VPN has a robust communication protocol and encryption
algorithm, so its security issues mainly come from its clients attacks [14].
The local security conguration is not perfect: The users control the local security
conguration of the VPNs client-side themselves. It means there might be some
security risks caused by human factors. For example, some clients may keep the
license certicate on the local device. Once the attacker gets the control of these
devices, they can open a VPN channel without even needing a login name and the
password and bypass the authentication process altogether.
Stealing VPN security information: Attackers can steal VPN security information
by using social engineering methods such as phishing. This security information
includes the IP address of the VPN client, conguration parameters, user license
certicates, etc. The attacker can forge a communication identity and pose a threat
to the security of a VPN by using this security information.
The internal security of VPN is weak: The security protection requirements for
trusted users are relatively low after VPN is successfully connected. Because there
is no attack prevention strategy in the tunnel that decreases the security risk within
the VPN.
SSL VPN: This VPN does not require specialized client software, but they use web
browsers for its implementation. Therefore, the security threats of SSL VPNs are
mainly focused on browsers and servers.
Security problems caused by incorrect system operation: If the user does not close
the SSL VPN by logging out at the end of the browser and the server process, it may
keep the SSL VPN server process open. The attacker can use this situation to bypass
authentication and access the VPN, which brings a high-security threat to the VPN
system.
Malicious attacks on identity authentication: SSL VPNs allow users to log on to
the VPN system from any location through a browser. This increases the risk of
leaking security information such as login id and passwords, especially when they
log in from public places.
The virus infects the internal network through the tunnel: SSL VPN remote users
can use any location of any client remote login within the enterprise network. Once
the viruses at client-side connect to the internal network, the infected le will be
able to use the SSL VPN tunnel to invade the internal network. At the same time,
due to the limitations of the internal network boundary of the rewall, it cannot
prevent the transmission of infected software or les effectively. As a result, the
virus can infect the internal network through the tunnel.
The security risks of the Web server itself: Most of the SSL VPN system use Web
server as its underlying platform. Therefore, the potential safety hazard of the Web
servers, such as the back door or unauthorized leaks will also bring serious security
problems to the SSL VPN system [14].
MPLS VPN: This VPN has adopted a strict routing information isolation mech-
anism. The security of user information transmission is guaranteed by using
1058 S. Jingyao et al.
schandel@nyit.edu
MPLS VPN. However, as a technology based on IP communication, its transmitted
information is not encrypted and authenticated, so there are still some security prob-
lems that exist in MPLS VPN [14].
Attacks against VPN routing devices. This attack usually occurs during the routing
information release phase. The attacker disguised as an edge device establishes a
session with the server equipment to connect and exchange routing information.
This will cause the disclosure of the VPNs internal routing information. The
attacker can also forge or tamper with the routing information to spread the users
data in the wrong direction to eavesdrop and steal the users personal information.
Security threats from the Internet. In the case of users accessing the Internet
through MPLS VPN, the attackers can attack the network by traditional attack
means such as IP source address deception, session hijacking, and planting Trojan
horse in the network. The users data ow will be viewed, modied, forged and
deleted by the hackers without their knowledge.
4.3 The Loopholes in Using Firewalls with VPNs
The rewalls with VPNs can provide a virtual private network on the unsafe Internet
through the VPN function. Therefore, it can guarantee the security of the condential
data of the enterprise when the remote access happens. However, at the same time,
there will be many loopholes in using this arrangement of rewalls with VPNs. The
loopholes in using rewalls with VPNs are shown in Table 4[15].
5 Using Firewalls and VPNs: The Most Common Attacks
and Threats
5.1 The Attacks and Threats of Using Firewalls
Generally, the most common attacks happen to the Packet Filtering Firewalls and the
Status/Dynamic Detection Firewalls [16]. In Table 5, we list the attacks that could
corrupt the rewall security.
The IP Spoong Attack. It can easily make use of a legal address from the
ordinary users. Attackers can avoid an authentication process provided by the rewall
using this way and hide. Also, when attackers use spoong attack, this behavior of
hackers will make the log, and NAC (Network Access Control) will point to the wrong
person when used to track down the attackers. This kind of MAC (Medium Access
Control) attack is straightforward to create and can facilitate a variety of advanced
attacks [17].
Denial of Service (DoS). Unlike many other attacks, DoS attack is purely mali-
cious because the hackers gain nothing personal from the attack. They attack the users
system with the aim of depriving the systems working ability. To overload the victim
network, the hackers send large data that oods the system. To send data, they usually
need to know the IP address of the targeted network, but rewalls with VPN can hide
the IP address and block the malicious data package.
Securing a Network: How Effective Using Firewalls and VPNs Are? 1059
schandel@nyit.edu
Table 4. The loopholes in using rewalls with VPNs
Contents Loopholes
Firewall rule virtual test No work can detect the effect of the congured strategy
Intranet service permissions
settings
No function
Quality of service loan allocation In general, there is no VPN within QoS permissions
Multi-line superposition and
backup of rewalls and VPNs
Only double backup
VPN maximum transmission unit Manually modify maximum transmission unit based on
the Internet environment
VPN dynamic IP addressing We can only use dynamic domain name system and other
third partys solutions. People control the use
Hardware binding authentication No function. Only username, and password
USB key security policy storage
and exchange
Only security certicates can be stored, and clients still
need professional staff
Support for mobile users Not supported or incorporated into through the PPTP
protocol with little support and inadequate security
Protocol, encapsulation, and
compression
Standard IPSec, using the network address translation
standard. User datagram protocol encapsulation ensures
that data is correct with other check elds. One by one
packet encapsulation and no compression technology
lead to low bandwidth utilization
VPN performance Using low-end hardware components. Single channel
connection speed is slow. The number of access support
is limited, and performance is unprotected
Support for VPN channels Unable to support a large number of branches and client
access, network performance signicantly decreased
when there are more nodes
Software No software VPN gateway
Convenience of implementation It is complicated that it needs professional stafng
Support for access methods It can only access with Internet IP and does not support
new access modes such as cell broadband, WLAN, and
GPRS
Table 5. The most common attacks on rewall
Types of rewall Attack
Packet ltering IP spoong attack
Denial of service
IP fragmentation attacks
Trojan attacks
Status/dynamic detection rewall Protocol tunnel attack
Passive FTP
Rebound Trojan attack
1060 S. Jingyao et al.
schandel@nyit.edu
IP Fragment Attack. In an IP fragment package, only the rst fragment has the
information of the TCP port. When the package is transmitted through the Packet
Filtering Firewall, the rewall only checks the rst fragment to decide whether to let it
pass. In this case, the attacker can cheat the rewall by sending a legitimate rst IP
fragment, and then the rest of the malicious fragment can pass through the rewall and
cause a threat to the network security [18].
Trojan Attack. It is the most effective attacking method to Packet Filtering Fire-
wall because once the Trojan is installed inside the network, there is nothing a rewall
can do to stop it. The reason is that the Packet Filtering Firewall usually only lter the
packet at the lower port (1-1024) and most Trojan attacks through the higher ports [19].
Protocol Tunnel Attack. The attack of the protocol tunnel is similar to the idea of
a VPN, and the attacker hides some malicious attack packets in the head of some of the
protocols, so it can penetrate the rewall system and attack the internal network [20].
Passive FTP. It solves the issue of an FTP clientsrewall blocking incoming
connections. PASVis the command that is used by the FTP client to let the server
know that it is in passive mode. This is a preferred mode for FTP clients behind a
rewall and is often used for web-based FTP clients and computers connecting to an
FTP server within a corporate network [21].
Rebound Trojan. The internal networks rebound Trojan periodically connects to
a host controlled by an external attacker. Since the connection is initiated from within,
the rewall considers it as a legitimate connection, causing the blind area of the
rewall. A rewall cannot distinguish between a Trojans connection and a legitimate
connection. The limitation of this attack is that the Trojan must be installed inside the
network rst [22].
5.2 The Attacks and Threats to a VPN
Choosing a VPN is a good idea to get protection against a network, especially when it
is a public Wi-Fi. However, use of a VPN can sometimes be a threat to security and
bring some risks as well. VPN establishes a channel between the user and the server, so
the users trust in the VPN provider is essential because the provider can see and record
all the data and can even alter the content. If a VPN is not congured correctly, a
hacker might be able to access the users local LAN directly, which is worse than being
exposed to public Wi-Fi. For example, GoGo, a VPN provider was accused of using
fake YouTube certicates that could leak userspasswords [23].
Man in the Middle Attack (MITM). Some VPN providers adopt pre-shared key
for their users, and that can lead their users to be caught up in a Man in the Middle
attack (MITM). In the MITM attack, there are two endpoints of victims, and the
attackers are third-party. The attackers can access the communication channel
between two endpoints and manipulate the messages [24]. MITM attack aims to
compromise the following three targets [25]:
Condentiality: It can be achieved by eavesdropping on the communication.
Integrity: Attackers can intercept the communication and modify messages.
Availability: By intercepting and destroying messages or modifying messages,
attackers can make one of the party to end communication.
Securing a Network: How Effective Using Firewalls and VPNs Are? 1061
schandel@nyit.edu
Hacking or Eavesdropping. It includes physical access or listening to the devices
that support VPNs. This can happen if someone loses their laptop or mobile device,
which supports VPNs. Most VPN applications are not congured for the best
security model, and the local license is stored in the device itself. In this case, the
hackers can access the VPN channel without entering a password.
Unauthorized Access to the VPN Data. Obtaining secure information from a VPN
is a third way in which VPN security may be corrupted. This security information
includes IP addresses, conguration parameters and user license certicates for a
VPN terminal. Access to this information may come from the insiders who know
the specics of a VPN, such as, people who have left or have been red from the
company. Most networks do not change frequently, and VPN connections remain in
the same state for a long time. Therefore, people leaving the company have many
opportunities to learn about specic ways to access the VPN. This security infor-
mation can also be obtained through other social engineering methods, such as
phishing or vishing.
Exploit Vulnerabilities in the System. A possible defect in the rmware itself or
some other weakness of the authentication system can be exploited, such as,
malicious spoong or redoing SSL authentication. It would even be possible for a
hacker to use these well-known vulnerabilities in the VPN concentrator to crash the
authentication system to invade the target system [5].
6 The Solutions for the Security Issues of Firewalls and VPN
6.1 The Solutions for the Security Issues of Firewalls
The Immune-Based Firewall System. After an intruder bypasses a rewall, they must
control the rewall system or break the work of the rewall system. To achieve this
goal, they must destroy the vital information of the rewall. Therefore, the immune-
based rewall system security model centers on the critical information les of the
rewall and uses the change of these les as a means to determine whether there is an
intrusion. Because the intrusion is the differencesin the rewall system.
The critical information le is the body of the rewall system. If an intruder
destroys the body of the rewall system, the rewall will nd and resist it to protect the
critical les that are on record. It will also record the destruction and control of the
network communication. The basic structure of the system security model is shown in
Fig. 5[26], centered on the critical information le of a rewall and le information
database. It also uses the immune subsystem as the core to build a relatively perfect
rewall system. However, when it comes to the actual application effect, the ltering
mechanism of the rewall against these attacks is still not perfect yet, and there is no
effective strategy to solve this problem. An ideal rewall ltering mechanism and the
security policy model is shown in Fig. 6[26].
Multi-Stage Filter. The Multi-stage lter uses multilevel ltering in the rewall to
lter out all source routing packets and the fake IP sources at the level of packet
ltering. The multi-stage lter is a technology that is now widely used by rewalls as
1062 S. Jingyao et al.
schandel@nyit.edu
packet ltering to efciently help the protection of rewalls. This method is evident in
the layer and can expand many new contents from this concept.
Next Generation Firewall. Next-Generation Firewall (NGFW) is the latest buzz in
the rewall market at present. Through in-depth insight into users, applications, and
content in network trafc, and with the help of a new high-performance single-path
heterogeneous parallel processing engine, NGFW can provide users with active
application layer integrated security protection. It can help users to conduct business
safely and simplify their network security architecture. Application recognition is the
most critical technology in the route. The technical route of NGFW is shown in
Fig. 7[27].
Secure Web Gateway. Secure Web Gateway (SWG) is a kind of product solution
for Internet exploitation. It has the functions like URL ltering, malicious code pro-
tection, control functions, and the application control functions including the Web
functions. This means it can enforce the enterprises Internet access strategy while
protecting it from the security threats. Most of the mainstream SWG products also
Fig. 5. The model of immune-based security rewall
Fig. 6. Protocol-based rewall security policy model
Securing a Network: How Effective Using Firewalls and VPNs Are? 1063
schandel@nyit.edu
provide the user identication and the DLP (Data Leakage Protection) function on this
basis. Some company such as Intel uses SWG to protect their companys security.
Figures 8and 9shows the structure of SWG rewall [28].
Fig. 7. Technical route of NGFW
Fig. 8. The hardware structure of embedded gateway
Fig. 9. The overall structure of gateway software
1064 S. Jingyao et al.
schandel@nyit.edu
Web Application Firewall. Web Application Firewall (WAF) is mainly used to
strengthen protection against web-specic intrusion methods such as DDoS attacks,
SQL injection, XML injection, XSS, etc. WAF can be divided into front-end capture,
rule setting and monitoring (brain), regulation action (monitoring or blocking), log
storage/monitoring display, and corresponding processing unit as shown in Fig. 10
[29]. Currently, there are three types of WAFs in the market, namely: Hardware Web
rewall, Web protection software and Cloud WAF.
6.2 The Solutions for the Security Issues of VPNs
Wi-Fi wall. It is a useful technology to protect the VPNs when the user connects to the
Wi-Fi. This technology can monitor the Wi-Fi trafc, and it can constantly check if
there are attacks. The Wi-Fi wall will disconnect the Wi-Fi once an attack is detected.
Authentication service. The VPN service providers need the authentication service
to help them to protect the identity information about the potential end-users [30].
Access control. This service can maintain the security and prevent the use of
unauthorized VPN service features and access to the unauthorized resources [30].
Data integrity and condentiality. This service can keep the integrity of infor-
mation, prevent the leakage of information, and counter threats. The cryptographic
hardware can protect the integrity and condentiality of management data [30].
VPN audit requirement. The suitable auditing system is necessary to detect
potential abuse, since the present security service and security mechanisms may be
compromised or bypassed. Therefore, the hackers may gain the unauthorized access
Fig. 10. WAF working principle
Securing a Network: How Effective Using Firewalls and VPNs Are? 1065
schandel@nyit.edu
and damage the VPN protected by them. Enumerating and understanding the VPN
service behavior is necessary for providing enough information for studying the VPN
auditing requirements [30].
VPN rewall. VPN Firewall is a kind of rewall that is installed at the server end
or the front of a VPN server. It is congured with the lters only to let the VPN specic
packets to access the network when installed at the server end of the VPN. However,
when it is installed at the front of a VPN, it will only allow the tunnel data on its
Internet interface to access the server [31].
HAIPE security gateway. In this model, VPN client edge device is intended to use
network hardware encryption device HAIPE as a security gateway to protect the
communication between VPN client sites. It is shown in Fig. 11 [32] that the VPN user
network consists of A and B stations. The edge of station A is deployed with the
HAIPE_A security gateway, and the edge of station B is deployed with the HAIPE_B
security gateway. HAIPE_A and HAIPE_B are equal and establish ESP (Encapsulating
Security Payload) encrypted tunnel between them, which let any information stream
between station A and station B be protected by the ESP encrypted tunnel. Only the
ow of the network to peer protection or the ow of the network from the peer
protection network will pass through the gateway, and the rest of the trafc is stopped
by the secure gateway of ESP encrypted tunnel.
7 Conclusion and Future Work
As a result of this study, we have concluded that the potential threats and risks to the
Internet and Intranet will keep growing and so does the development of rewalls and
VPNs. With the increased implementation of technology in almost all possible domains
of cyberspace, the security and protection of a network will need more attention with
time. We also realized that the gap between the potential threats and the risks to these
Fig. 11. Diagram of HAIPE security gateway protecting plain text (PT) domain communication
1066 S. Jingyao et al.
schandel@nyit.edu
systems are growing exponentially and the present-day rewalls and VPNs are not full
proof yet. This results in defeating their purpose sometimes.
We also concluded that it is not easy to judge rewall or VPN against each other
because there are many types of rewalls and VPNs available in the market and each
one of them has its advantages and disadvantages. The kind of users and their demands
regarding how much safety they want in their network and how much budget do they
have to get what they need in a rewall or VPN is also the key in its implementation.
A combination of rewalls and VPNs can always provide more security to a network
than using them individually. The users also need to keep in mind that both VPNs and
rewalls have quite a few security aws and there are various solutions available to
avoid these loopholes. Our advice is to consider the application environment and the
users expectation of performance carefully when choosing a rewall or a VPN or both
for creating a secure network system. However, there are still some parts that we did
not cover in this paper. Our following plan for this topic is to study some methods that
can deal with the security issues both related to rewalls and VPNs since we have
already researched the security threats, risks, and issues that both rewalls and VPNs
have.
In all, we hope that our work can be used as a reference by the organizations and
individuals when it comes to the solutions for the loopholes, threats, and risks related to
arewall and a VPN. Further study needs to be done to make a unied model of a
secure rewall and VPN to ght the attacks and the attackers and save the data and the
network from being destroyed or breached.
References
1. Ma, L., Liang, H.: Application of rewall technology in computer network security. Comput.
Knowl. Technol. 10, 37433745 (2014). Print
2. Jiang, C.: Research on computer network security technology and rewall technology.
Ability Wisdom 235 (2017). Print
3. Su, J., Yuan, J.: Firewall technology and its development. Comput. Eng. Appl. 147149
(2004)
4. Zhang, Z., et al.: VPN: boon or trap? A comparative study of MPLS, IPSec, and SSL virtual
private network. In: ICCMC 2018 (In Press)
5. Sun, J., Wei, J.: Computer Network Technology and Application. Xian University of
Electronic Science and Technology, Xian, China (2010)
6. Stateful-inspection rewall: the Netscreen way. http://www.netscreen.com/products/
rewallwpaper.html
7. Li, S., Tørresen, J., Sorensen, O.: Exploiting Stateful Inspection of Network Security in Re-
Congurable Hardware
8. Suehring, S.: Linux Firewalls: Enhancing Security with Nftables and Beyond, Illustrated
edn, p. 25. Pearson Education (2015). ISBN 0134000021
9. Successful case: Hanbo rewall to build a safe and efcient enterprise Intranet. Network
World 2011-12-12 (021) (2011)
10. Qing, Y.: Shortcomings and improvements in rewall security. Sci. Technol. Eng. 14, 1009
1012 (2005)
Securing a Network: How Effective Using Firewalls and VPNs Are? 1067
schandel@nyit.edu
11. Sun, K.: Concrete application of rewall technology in computer network security. Sci.
Technol. Econ. Guide 17, 38 (2017)
12. Wang, D.: Research on Deep Packet Inspection Technology of Firewall. Xian University of
Electronic Science and Technology (2005)
13. Zhang, T.: Design and Implementation of Firewall Based on Content Filtering Software.
University of Electronic Science and Technology (2012)
14. Security analysis of VPN technology, 19 Sept 2014. Web. http://sec.chinabyte.com/368/
13082868.shtml
15. Comparison between professional VPN and rewall with VPN. Web. https://wenku.baidu.
com/view/6e89ab1055270722192ef791.html
16. Network security: a simple guide to rewalls. In: Network Security, pp. 23 (2000)
17. Yadav, A.S.S., et al.: Prevention of spoong attacks in wireless networks. In: International
Conference on Computing Communication Control and Automation, pp. 164171. IEEE
(2015)
18. Hollis, K.: The Rose Attack Explained. Retrieved on 2013-11-25
19. Sakurai, S., Ushirozawa, S.: Input method against Trojan horse and replay attack. In: IEEE
International Conference on Information Theory and Information Security, pp. 384389.
IEEE (2010)
20. Chen, D., Wang, P.: Study and implementation of tunnel attack in MANET. Comput. Eng.
33(9), pp. 140141 (2007)
21. What is PASV FTP (passive FTP)? 13 Jun 2018. Web. https://www.lifewire.com/denition-
of-passive-mode-ftp-816441
22. Zhao, T.F., et al.: Detecting rebound port Trojan based on network behavior analysis.
Netinfo Secur. (2011)
23. VPN helps you scale the wall? Lets put our privacy rst, 6 Jun 2016. Web. https://www.
jb51.net/hack/471867.html
24. Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun.
Surv. Tutor. 18, 20272051 (2016)
25. Khan, M.M., Bakhtiari, M., Bakhtiari, S.: An HTTPS approach to resist man in the middle
attack in secure SMS using ECC and RSA. In: 2013 13th International Conference on
Intelligent Systems Design and Applications, pp. 115120, Dec 2013
26. Yang, Z., Cheng, Q.: Research of immune-based technology for the rewall system security.
Microcomput. Inf. 21, 9-3
27. Network behavior management and the next generation of rewalls, SWG relations. Web.
https://jingyan.baidu.com/article/cbf0e50095f63a2eaa2893cc.html
28. Zhao, Y., Du, Y.: Design and implementation of embedded secure web gateway. Comput.
Eng. Des. 27(4) (2006)
29. Sahin, M., Sogukpınar, I.: An efcient rewall for web applications (EFWA). In: 2017
International Conference on Computer Science and Engineering (UBMK), pp. 11501155
(2017)
30. Boukari, N., Aljane, A.: Security and auditing of VPN. In: Proceedings of Third
International Workshop on Services in Distributed and Networked Environments,
pp. 132138, 6 Aug 1996
31. VPN rewall. Techopedia. 28 Jun 2017. Web. https://www.techopedia.com/denition/
30753/vpn-rewall
32. Dian, A.: Security research and improvement of mainstream VPN technology (2009)
1068 S. Jingyao et al.
schandel@nyit.edu
... ISAKMP is the negotiation protocol that makes peers negotiate on how to build the IPsec security association. VPNs can be used with or without firewalls, but they are not recommended to be implemented without firewalls as their primary purpose is to secure network traffic [13]. ...
... Generally, information security is done in hardware, which means that the security side is strengthened by the hardware that is around the hardware. Such as the use of firewalls, VPNs and others [9], [10]. ...
Article
In the industrial era 4.0, technology is utilised as much as possible to advance the welfare of life. One use of technology commonly used in education is online-based exams. In addition to saving paper, online-based exams can reduce operational costs in carrying out exams. Currently, many online-based exam models are used for various types of exams. Starting with the computer-based Test, CAT-based CPNS test, etc., researchers developed a method by utilising geolocation to run an online-based examination system. In this study, the author wants to utilise geolocation as one of the requirements for accessing needed resources; in this case, the online-based quiz system was adopted. Using geolocation in the online-based quiz system is expected to provide security for the examination system so that examiners can assess their students as best they can
... IPSs can block traffic from suspicious sources, modify traffic to make it less harmful, or even disconnect infected devices from the network [24]. Virtual Private Networks (VPN) allow users to access the corporate network securely and remotely [25]. VPNs encrypt traffic between the user's device and the corporate network, making it difficult for attackers to intercept or steal sensitive data. ...
Article
Full-text available
As sixth-generation (6G) cellular networks emerge, promising unparalleled connectivity and capabilities, yet it amplifies concerns regarding security vulnerabilities. These networks include a broader array of devices and sensors compared to earlier generations, increasing the potential for attackers to exploit weaknesses. Existing security frameworks contribute to safeguarding enterprises against external threats that originate beyond the network perimeter. These frameworks operate under the assumption that all entities inside the defined perimeters are reliable, and their primary objective is to authorize access to resources based on assigned roles and permissions. However, this strategy could be more effective today since attacks might originate from any source, including within the network perimeter. To address this issue, a zero-trust architecture (ZTA) could be a potential solution that assumes neither users nor devices can be inherently trusted, and it consistently evaluates potential risks to decide whether to allowaccess to resources. This article will explore the zero-trust approach and its significance in contemporary network security. We describe the role of authentication and access control in ZTA and present an in-depth discussion of state-of-the-art authentication and access control techniques in different scenarios. This article examines the applicability of the zero-trust concept in 6G networks and analyzes the associated challenges and opportunities. This article also examines case studies demonstrating the practical application of the zero trust paradigm in 6G or comparable networks. It explores the research scope and tries to identify relevant research gaps in this area.
Book
Tujuan penyusunan buku ini adalah untuk membantu para pembaca, memahami bahwa isi buku ini merupakan bagian tidak terpisahkan dan sangat penting dalam kelangsungan bisnis masa sekarang dan masa yang akan datang. Buku ini berisi materi yang dapat digunakan baik oleh tenaga pengajar maupun mahasiswa, serta para pembaca umumnya untuk menambah wawasan berpikir dan ilmu yang berkenaan dengan Ekonomi dan Bisnis. Buku ini terdiri dari 16 Bab yang membahas tentang: Bab 1 Pengenalan E-Commerce1. Bab 2 Infrastruktur dan Teknologi E-Commerce Bab 3 Model Bisnis E-Commerce: B2B Bab 4 Model Bisnis E-commerce: B2C Bab 5 Bisnis Model E-Commerce C2C Bab 6 Model Bisnis E-Commerce C2B Bab 7 E-Commerce Mobile (M-Commerce) Bab 8 Strategi Pemasaran Digital untuk E-commerce Bab 9 Pengelolaan dan Analitik Data E-Commerce Bab 10 Keamanan Informasi dan Privasi dalam E-Commerce Bab 11 Pengalaman Pengguna (User Experience) dalam E-commerce Bab 12 Pembayaran Online dan Gateway Bab 13 Manajemen Logistik dan Rantai Pasok Dalam E-Commerce Bab 14 E-Commerce dan Media Sosial Bab 15 Peraturan dan Kebijakan E-Commerce Bab 16 Inovasi dan Tren Terkini dalam E-Commerce Buku ini dapat terwujud dan diterbitkan hanya dengan modal semangat kolaborasi yang solid tim penulis yang berasal dari berbagai Perguruan Tinggi dan Instansi. Penyusunan buku ini juga merupakan implementasi Tri Dharma Perguruan Tinggi. Tim Penulis merasakan bahwa dukungan moral dan material dari berbagai pihak sangatlah membantu tersusunnya buku ini. Tim Penulis menyadari jika dalam penyusunan buku ini masih terdapat kekurangan, tetapi Tim Penulis selalu berkenan menerima kritik dan saran yang konstruktif demi penyempurnaan buku ini di kemudian hari. Semoga buku ini bermanfaat bagi para pembaca.
Chapter
The goal of network defense mechanisms is to enable systems to actively detect and withstand attacks, reduce reliance on external security measures, and quickly recover and repair. This paper elaborates on relevant works from both passive defense and proactive defense perspectives. Our first contribution is to introduce strategies and technologies related to passive defense, discussing in detail access control strategies, identity authentication technologies, and firewall technologies. These technologies play a significant role in protecting computer systems and networks from unauthorized access and malicious activities. Addressing the limitations of passive defense, such as: difficult to resolve uncertainty attacks and passive self-defense, our second contribution is to introduce strategies and technologies related to proactive defense. Firstly, we provide a comparative introduction to moving target strategies, intrusion tolerance strategies, and mimic defense strategies. Secondly, based on the mimic defense strategy, we provide a detailed introduction to mimic routers and mimic server technologies, which simulate normal network traffic and service behavior to enhance system security. Moreover, we provide future prospects and suggest potential directions. These approaches can help protect computer systems and networks from various security threats and provide valuable insights for researchers and security professionals on how to address evolving threats.
Article
The study is devoted to the organization of data transmission channel protection in software with a client-server architecture. In today's information environment, where data exchange takes place over the network, ensuring security becomes a critical task. The effectiveness of the data channel protection method in a client-server architecture program was developed and evaluated. A method has been developed that ensures encryption of messages from interception and data modification and prevents modification of the client software and abuse during its use.
Conference Paper
Prevention of spoofing attacks is a hard problem. We propose a method of preventing the MAC Address spoofing attack. Here we will use an intermediate or dummy node which lies between the server and the users. This dummy node serves 2 purposes-1). Ignore the data requests by attackers 2). Reduce the traffic on the server. The detection of attackers is done by considering physical spatial information in the form of RSS (Received Signal Strength). Dividing the different users/nodes into clusters by using K-Means algorithm. Further the number of attackers are provided by GADE (Generalized Attack Detection Model) and attacker is detected and localized by IDOL (Integrated Detection a Localization System).
Article
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, we extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based on several parameters, like location of an attacker in the network, nature of a communication channel, and impersonation techniques. Based on an impersonation techniques classification, we then provide execution steps for each MITM class. We survey existing countermeasures and discuss the comparison among them. Finally, based on our analysis, we propose a categorisation of MITM prevention mechanisms, and we identify some possible directions for future research.
Conference Paper
Short Messaging Service (SMS) has removed difference between near and far. Because of guaranteed delivery, people use it on daily basis for connectivity. Not only humans but Information Systems have also utilized it to connect, known as automated messaging. Although automated messaging holds prominent SMS market share but full potential was not reached because of the fact that SMS has no security at all. Any SMS sent or received can be intercepted and manipulated by Man In The Middle (MITM). To resist MITM in next generation smartphones we have proposed a new framework which can be used to secure both human and automated messaging. This new framework use HTTPS for secure key exchange, ECC, RSA as encryption algorithm and GSM network to send and receive encrypted messages.
Article
Aiding by some function provided with PROTEUS, such as schematic editor, circuit simulation, digital and analog circuit analysis and simulating capabilities of the ATmega microcontroller. This paper has realized code debugging, circuit design and verification, and functional debugging of intelligent closestool based on ATmega128. Through the use of EDA software to change the traditional design and implementation process of embedded systems.
Article
During a user's transactions over the Internet, there are risks of unauthorised third party transactions carried out on the user's account, using the man-in-the-middle (MITM) attack and Trojan horse. In this paper, we propose a new interactive input method of sensitive information such as credit-card numbers and account numbers against these attacks. The proposing method relatively decides the input value that a user inputs using GUI with two or more cursors which move to different directions simultaneously. The user inputs the information based on a shared secret between the user and a server beforehand, and moves one of the cursors from the shared secret to the input value, and the server changes the cursors' position and asks a question about the value which the users cursors points at. The server can decide the user's input value though the response for the question. This method is strong and does not give any hint about which cursor is used t to the attacker unless both the user and the server expose the shared value and the input value.
Conference Paper
This paper describes an implementation architecture of an auditing system applied to a simulated virtual private network service. It analyses the VPN security and audit requirements and illustrates the auditing system components: the audit manager, the audit and the virtual private network service managed objects
Computer Network Technology and Application. Xi’an University of Electronic Science and Technology
  • J Sun
  • J Wei