Science topic

Firewalls - Science topic

Explore the latest questions and answers in Firewalls, and find Firewalls experts.
Questions related to Firewalls
  • asked a question related to Firewalls
Question
4 answers
Research Aim: Most data transmission is monitored by a firewall, which can also recognise and restrict undesirable traffic. The goal of this study is to highlight the potential features of a firewall while preventing cyber-attacks. The study aims to provide a detailed overview of the various categories of current and contemporary firewalls. The study uses a secondary research methodology to complete the research.
Relevant answer
Firewalls play a critical role in preventing cyber attacks and enhancing cybersecurity in network environments. Here are some key impacts of using a firewall:
Network Traffic Filtering: Firewalls act as a barrier between an organization's internal network and external networks, such as the internet. They analyze incoming and outgoing network traffic based on predefined security rules and policies. By filtering and inspecting network packets, firewalls can block unauthorized or malicious traffic while allowing legitimate communication. This helps to prevent unauthorized access and potential cyber attacks.
Access Control: Firewalls enable organizations to define access control policies for network resources. They can enforce rules that restrict or permit specific types of network connections based on criteria like IP addresses, ports, protocols, or application-level information. By controlling access to internal resources, firewalls help mitigate the risk of unauthorized access, data breaches, and other cyber threats.
Threat Detection and Prevention: Firewalls incorporate various security mechanisms to detect and prevent specific types of cyber threats. These mechanisms include:
Intrusion Detection System (IDS): Firewalls can integrate IDS functionality to identify and alert on suspicious or malicious network activities, such as port scanning, brute-force attacks, or known attack patterns.
Intrusion Prevention System (IPS): Advanced firewalls may include IPS capabilities that actively block or mitigate detected threats in real-time. IPS can automatically respond to suspicious activities, such as blocking malicious IP addresses or preventing specific network attacks.
Application Layer Filtering: Firewalls can inspect network traffic at the application layer to identify and block potentially malicious content or behavior. They can detect and prevent attacks like SQL injection, cross-site scripting (XSS), or malware downloads.
Network Segmentation: Firewalls facilitate network segmentation by dividing a network into multiple security zones. This allows organizations to isolate sensitive systems or data from less trusted areas. By enforcing strict communication rules between segments, firewalls limit the lateral movement of attackers in case of a breach, reducing the potential impact of an attack.
Logging and Auditing: Firewalls often provide logging and auditing capabilities, allowing organizations to monitor network traffic and security events. This information is valuable for incident response, forensic analysis, and compliance purposes. Firewall logs can help identify potential security incidents, track suspicious activities, and provide evidence in case of investigations.
It's important to note that firewalls are just one component of a comprehensive cybersecurity strategy. They should be complemented with other security measures such as regular patching, strong authentication mechanisms, employee awareness training, and proactive monitoring to ensure effective protection against cyber threats.
  • asked a question related to Firewalls
Question
7 answers
There are some famous corollaries of the equivalence principle:
1. Unruh effect is locally equivalent to Hawking radiation near the horizon, therefore "static" observer outside a blackhole will see radiation, while a free-fall observer will not.
2. Firewall, i.e., a free-fall observer will be evaporated at the horizon, is forbidden by the equivalence principle.
However, there is no physical law saying that no inertial observer will see thermal radiation or Firewall (it is bizarre, but not forbidden) in flat spacetime. The problem is the equivalence principle only restricts the evolution rule of the system but has no hint on boundary conditions. When people are using the above corollaries, are they assuming some particular boundary conditions?
How can we apply the equivalence principle in general?
Relevant answer
Answer
Draw a curve and notice that it looks flat when observed through a microscope. In this flat domain, general relativity becomes teleparallel equivalent general relativity. Down here, the covariant spin connection is used to regularize quantum general relativity and the renormalized action becomes just the integral of the mass over time. Einstein chose to use curvature, and not torsion, to define general relativity for the sole purpose of elevating the equivalence principle. Down here we separate gravity from inertia and quantize just gravity, using the covariant spin connection as a regulator. Down here the equivalence principle is replaced by a new boson, dubbed the Lorentz boson, that couples to fermion number at gravitational strength. Down here Bell’s theorem is broken by torsion. Down here becomes macroscopic, and macroscopic entanglement is produced, before fermions localize and couple to Lorentz bosons, forcing entanglement entropy to become causal. That all happens down here. Just have a look through the microscope.
  • asked a question related to Firewalls
Question
3 answers
Could anyone suggest me datasets about firewall
Relevant answer
Answer
Internet Firewall Data Set | Kaggle ...
plz go through the above site it may useful..
  • asked a question related to Firewalls
Question
3 answers
Usecase- To provide the security of the data by building Next-generation firewalls or Is there any better firewall type to handle the normal systems. Please do suggest me any answers!!.
Relevant answer
Answer
Dear Roshan Reddy,
To enable security of electronic communications there are three groups of problems - endpoint security, cloud / network security, and identity and access management security. Firewalls are important, but it's just a part of the puzzle.
  • asked a question related to Firewalls
Question
9 answers
I have tried to run Autodock by following youtube video ( https://www.youtube.com/watch?v=llaVCIfH0sA ) but when I run AutoDock the error message comes. I have pasted the error message below please help me to fix this.
............................................................................................................................................
Python 2.5.2 (r252:60911, Feb 21 2008, 13:11:45) [MSC v.1310 32 bit (Intel)] on win32
Type "copyright", "credits" or "license()" for more information.
****************************************************************
Personal firewall software may warn about the connection IDLE
makes to its subprocess using this computer's internal loopback
interface. This connection is not visible on any external
interface and no data is sent to or received from the Internet.
****************************************************************
IDLE 1.2.2 ==== No Subprocess ====
>>> adding gasteiger charges to 3ec5
3ec5 already has gasteiger charges
3ec5 already has gasteiger charges
ERROR *********************************************
Traceback (most recent call last):
File "C:\Program Files\MGLTools-1.5.6\lib\site-packages\ViewerFramework\VF.py", line 898, in tryto
result = command( *args, **kw )
File "C:\Program Files\MGLTools-1.5.6\lib\site-packages\AutoDockTools\autostartCommands.py", line 964, in doit
ps = subprocess.Popen(args)
File "C:\Program Files\MGLTools-1.5.6\lib\subprocess.py", line 594, in __init__
errread, errwrite)
File "C:\Program Files\MGLTools-1.5.6\lib\subprocess.py", line 816, in _execute_child
startupinfo)
WindowsError: [Error 740] The requested operation requires elevation
Relevant answer
Answer
I had the whole conversation, and try it, but still ain't working
  • asked a question related to Firewalls
Question
1 answer
Tcpreplay use to replay network traffic
Relevant answer
Answer
Hello, Could you find some solution? I am with the same problem.
Thanks.
  • asked a question related to Firewalls
Question
2 answers
Dear All,
I am interested in exploring open source firewall software for computer network laboratory. Can you please share a good open source firewall software with its download URL?
Thanking you,
Relevant answer
Answer
Dear Kuntal Patel,
List of Open Source Firewall software.
  1. pfSense : https://www.pfsense.org/
  2. OPNsense : https://opnsense.org/
  3. IPFire : https://www.ipfire.org/
  4. TinyWall : https://tinywall.pados.hu/
I hope the information will help you.
With Best Wishes,
Samir G Pandya
  • asked a question related to Firewalls
Question
1 answer
Is a Policy Document for Next Generation Data Center? for level hardware security such as firewall policy, WAF, WSUS and others...
Relevant answer
Policy Document for Next Generation Data Center:
Protection with coverage over the industry-practice Top 10 OWASP in handling online threats. Virtual patching ensures such vulnerabilities are mitigated while corrective measures are underway.
  • asked a question related to Firewalls
Question
8 answers
There are several ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls are setup and configured properly. Researchers, What are the best deeper options to handle this security and management?
Relevant answer
Answer
Securing your network can be done in different ways, without going in details (you can look up the different terms yourself).
Hardening network (use firewalls / IPS), implement segmentation (subnetting), Update software, Monitoring (NIDS, HIDS, read logging).
Check list: - change standard passwords - remove unused users & guest - remove unneeded services (f.e.Wi-Fi, bluetooth) - block unneeded ports - update software (on network devices like routers, firewalls etc) - use smart firewall settings to enable the needed services and block unwanted traffic. Last but not least test your network by periodic pentesting.
  • asked a question related to Firewalls
Question
4 answers
How do I setup the firewall configuration at a node? Are there options for access control list? If yes, is code modification required for this?
Relevant answer
Answer
Dear Sir...
This link can help you
Regards
  • asked a question related to Firewalls
Question
4 answers
What is the best solution at Gateway between the Internet (Public) and the Intranet (Vast LAN/VLAN (Private)) for the intruder detection, drop or deny, stopping spam emails and viruses/malwares, protect from exploiting vulnerabilities, flood a targets in application and communication protocol etc. and a best monitoring, evaluation and analysis tool for the better safeguard. Normally we intend to implement either a software or hardware firewall which enforces a set security policies that needs to be fine-tuned according to the recent advancement and race.
We can take all possible measures for the security of databases servers, web servers, systems servers with a set of inbuilt security mechanism and secure travel of transactions over the net based on encryption & VPN as choices are available.
Relevant answer
Answer
check the website https://www.zscaler.com/products/zscaler-internet-access A secure Internet gateway is a security solution that delivers protection to the internet network by preventing unauthorized traffic to enter the organization’s internal network. It is deployed by enterprises to provide security to their users from getting infected by malicious internet traffic, suspicious websites or malware. It also enables to follow compliance of the organization's policies and regulations. A gateway is a router which is a halting point for data that comes in and goes out of the computer network. Gateway has made communication easy to send and receive data across networks. Gateway is the prime component and without it, internet would not have been of any use.
Importance of Secure Internet Gateway - A Secure Internet Gateway is predominently deployed to monitor, track and protect the internet network by preventing suspicious traffic and data from coming in and going out of the corporate network. A secure web gateway is primarily used to monitor and prevent malicious traffic and data from entering, or even leaving, an organization’s network. It is deployed through gateway device/hardware/application implementing on the borders of the network obstruct current and future threats over all ports and protocols. It terminates access to malicious domains, IPs, URLs, and files even before establishing a connection or downloading a file. Secure Internet Gateway features URL filtering, application level control, data leakage prevention, malware code detection. Best Secure Internet Gateway Software -
Comodo Dome Secure Internet Gateway offers a security suite with functionalities to detect and obstruct any kind of malware activity from entering the network without creating any impact on the user experience and other normal operations of the computer. Comodo Dome implements the Default Deny approach through auto-containment technology, and ensures prevention mechanism by analysing the unknown or suspicious files even before they are delivered to the users. It is comprehensive, flexible, end-user friendly and easy to set up.
  • asked a question related to Firewalls
Question
3 answers
I am using seqinr package in R. But when I am giving the command choosebank() to find out the existing databases or commands like choosebank('swissport") to open any specific database, R is showing error msg. -
Error in socketConnection(host = host, port = port, server = server, blocking = blocking, :
cannot open the connection
In addition: Warning message:
In socketConnection(host = host, port = port, server = server, blocking = blocking, :
pbil.univ-lyon1.fr:5558 cannot be opened
Error in choosebank() : I wasn't able to open the socket connection:
o Check that your are connected to the internet.
o Check that port 5558 is not closed by a firewall.
o Try to increase timeout value (current is 5 seconds).
How can I overcome this issue!!!!
Relevant answer
Answer
Try running the script outside your University network.
  • asked a question related to Firewalls
Question
5 answers
I am currently working on a project where I am testing the security of a network.
I was wondering if it was able to scan the internal network of an organization.
This network seems to be protected by a DMZ, which uses stateless firewalls.
Relevant answer
Answer
You can bypass the firewall rules by using different flags in nmap scan. You also can do a source port or source ip manipulation to see whether you can scan the internal network. If we assume the internal network and DMZ are in two different IP blocks then the first task is to find some IP block which will refer to internal network. I would suggest doing a maltego assessment to get any details from a domain which will point out some IP block. Another way to do this is to compromise a server on DMZ and access internal sources via it. The process of scanning internal network is long and task oriented. You might want to unleash all the resources and tools on them to see whether you can gain access. Well easy way in social engineering. You do a phishing attack to see whether anyone is biting the bait.
  • asked a question related to Firewalls
Question
4 answers
Hello,
Iam trying to perform a protein -protein docking using ADT tools in mac and in first step it gives following error,
Python 2.5.6 (r256:88840, Oct 26 2012, 16:44:06)
[GCC 4.0.1 (Apple Inc. build 5465)] on darwin
Type "copyright", "credits" or "license()" for more information.
****************************************************************
Personal firewall software may warn about the connection IDLE
makes to its subprocess using this computer's internal loopback
interface. This connection is not visible on any external
interface and no data is sent to or received from the Internet.
****************************************************************
IDLE 1.2.6 ==== No Subprocess ====
>>> dlopen(/Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/_UTVolumeLibrary.so, 2): Symbol not found: _glGetColorTableEXT
Referenced from: /Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/_UTVolumeLibrary.so
Expected in: /usr/X11/lib/libGL.1.dylib
Cannot import grid3DCommands. Disabling grid3DCommands...
ERROR *********************************************
Traceback (most recent call last):
File "/Library/MGLTools/1.5.6/MGLToolsPckgs/ViewerFramework/VF.py", line 898, in tryto
result = command( *args, **kw )
File "/Library/MGLTools/1.5.6/MGLToolsPckgs/Pmv/APBSCommands.py", line 4034, in checkDependencies
from Volume.Renderers.UTVolumeLibrary import UTVolumeLibrary
File "/Library/MGLTools/1.5.6/MGLToolsPckgs/Volume/Renderers/UTVolumeLibrary/UTVolumeLibrary.py", line 2, in <module>
from UTpackages.UTvolrend.UTVolumeLibrary import *
File "/Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/UTVolumeLibrary.py", line 7, in <module>
import _UTVolumeLibrary
ImportError: dlopen(/Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/_UTVolumeLibrary.so, 2): Symbol not found: _glGetColorTableEXT
Referenced from: /Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/_UTVolumeLibrary.so
Expected in: /usr/X11/lib/libGL.1.dylib
WARNING: dependency check failed for command APBSVolumeRender
Relevant answer
Answer
Did you solve the problem? I have the same issue when open autodocktools
  • asked a question related to Firewalls
Question
2 answers
The router is to be used without a firewall. Or is there a way to configure bandwidth of FE port without using a router?
Relevant answer
Answer
The bandwidth can be managed over DWDM link using multiple wavelengths according to the available bandwidth of wavelength. Set of wavelength can be used over the built lightpath to assure traffic transfer. In this case, layer 2 can be used to guarantee the switching of traffic from the ingress edge node to egress edge node. The useful solution is to ensure the data and control plane using safe layer 2.
  • asked a question related to Firewalls
Question
8 answers
Does anyone have experience with FIREMAN toolkit. I need to know how to install it, and how to use it to analyse the efficiency of my firewall?
Or, what tools you using to analyse and test the efficiency of your Firewall?
  • asked a question related to Firewalls
Question
5 answers
How to find exactly the number of users from outside that are passing through edge router   , firewall and connecting  to the LAN servers currently or  in specific time . I dont have access to servers for using IIS Logs to determine number of hits, please guide me how can I find the exact number of users via cisco edge router or cisco firewall
  • asked a question related to Firewalls
Question
25 answers
(BY REQUEST, RE-OPENED). This is a social question, with immediate technical relevance. Cybersecurity, for example, depends on this question, and trust as "reliance on expected behavior" [1,2].
A positive answer can be reached through control, you just turn-off the offending user. But, when control is not possible (example, the Internet), or as when central control does not even exist, trust evaporates if it is based solely on control (or, better yet, fear of control). However, can trust be based on other factors in addition to control, or even fear of control? Does that pose a better future for a society that accepts it?
What is your experience, reasoned expectations, or theory?
Relevant answer
Answer
Hello,
Your answer seems to give good examples. Trust is earned, reciprocity is one way to earn trust, even in absolute monarchies in middle-age Europe.
In some societies, if there is as a rule (say) that if one lives in an apartment building with more than three stories, one cannot shower after 9 pm and before 5 pm, because of potential noise to neighbors, there is no explicit cost if one disobeys but hardly anyone does. That would be an example, or if everyone likely wants to disobey the traffic lights late at night, because of potential robbery and the streets are empty, but the law has cameras with heavy fines if one disobeys, a conflict of rights can ensue -- the traffic law versus individual right to life.
  • asked a question related to Firewalls
Question
3 answers
Hi all. I have successfully created and simulated a network with 2 scenarios: with and without firewall.
When i try to compare/view the results it seems the system cannot locate my current project file.
Please, anyone can help me? Many thanks.
Relevant answer
Answer
By default, OPNET creates a “op_models” folder in your home directory . All the projects created in previous labs were saved in this directory. So you need to copy this folder to the local disk (say, the desktop).
For more information read this :
  • asked a question related to Firewalls
Question
3 answers
How Can I provide the required support and guidance as an IT OPERATIONS MANAGER and What are some of the duties and Responsibilities for me to Administer on Window 2008/2012/2016 Servers with respect to the process of Installation, Maintenance and Troubleshooting likewise for SQL 2000/2007/2012 Server and Exchange 2000/2007/2013 administration Skills, and Network Management (TCP/IP, LAN/WAN, VLAN, VPN, DHCP, DNS, Firewall, Fibre Optic) Group Policy 2008+, Kaspersky Antivirus and Mime Cast, Pure Message System Back-up and Recovery in a disciplined approach?
Relevant answer
Answer
Thankyou, Himadri Nath Saha for your Answer.
  • asked a question related to Firewalls
Question
30 answers
In March 2012, Joseph Polchinski claimed that the following three statements cannot all be true [1]: (i) Hawking radiation is in a pure state, (ii) the information carried by the radiation is emitted from the region near the horizon, with low energy effective field theory valid beyond some microscopic distance from the horizon, (iii) the infalling observer encounters nothing unusual at the horizon. Joseph Polchinski argue that the most conservative resolution is that [1]: the infalling observer burns up at the horizon. In Polchinski's account, quantum effects would turn the event horizon into a seething maelstrom of particles. Anyone who fell into it would hit a wall of fire and be burned to a crisp in an instant. As pointed out by physics community such firewalls would violate a foundational tenet of contemporary physics known as the equivalence principle [2], it states in part that an observer falling in a gravitational field --- even the powerful one inside a black hole --- will see exactly the same phenomena as an accelerated observer floating in empty space [3].
[1] Almheiri, A., Marolf, D., Polchinski, J.,Sully, J. http://arxiv. org/abs/1207.3123 (2012). [2] Ginzburg V.L.,Eroshenko, Yu.N.,Once again about the equivalence principle, 1996 Phys.-Usp. 39 1275 [3] Merali, Z., 4 April 2013,Vol 496,Nature,23
Relevant answer
Answer
No, in fact, he isn't-because there's no reason to expect low energy effective field theory to be an appropriate description.
Incidentally, the event horizon of a black hole isn't a space)like surface; so the statements about ``vicinity of the event horizon'' or ``near (or far from) the event horizon'' aren't meaningful.
An observer in free fall in a black hole spacetime isn't equivalent to an accelerating observer in flat spacetime, because the black hole spacetime has singularities.
  • asked a question related to Firewalls
Question
3 answers
Hi EveryOne?
Thanks for your precious time.kindly help me to understand which is
best firewall or NIDS (Network Intrusion Detection System ) in today's world (Private and Government sector) ?
Furthermore; is this figure correct means which thing comes first firewall or IDS ?
Your prompt response will be highly appreciated .
Relevant answer
Answer
Dear Sangeen Khan ,
Thank you very much for detail and informative answer.
  • asked a question related to Firewalls
Question
10 answers
I don't know how to collect data or simulate these things . How to simulate server , router etc . I am new in this area , so please help me . please give me any link  , by reading which ,i can simulate these things.
Relevant answer
Answer
I agree with Bob Duncan. Unless you are interested in log parsing and "a posteriori" discovery of attacks, an effective IDS must operate in real time.
There is another aspect that must be taken in account: the economical costs of security. An IDS cannot be more expensive than the system it want to protect. The cost of an IDS must be a fraction of the cost of the entire system. The real time requirement for an IDS could make its cost too high.
Anyway, if your choice is to have an IDS that identities attacks in real time, you cannot use an IDS based on "pattern matching": it is too slow and too unstructured for managing attacks in real time.
It is slow because of the computational cost of a regular expressions is not always linear, it could be related to the length of the input to be checked multiplied to the length of the regular expression you want to verify in the input. Furthermore, a good IDS should check the input against a set of of possible attacks, and, considering a regular expression for each attack, this inserts another factor (the number of regular expressions to be checked) to the final computational cost of the IDS, making the real time infeasible unless you spend a lot of money for a fast parallel hardware.
Secondly, regular expression are unable to match structured attacks sequenced over multiple network packets and transactions. A real structured attack could be sequenced over many transactions and many clients, and a real IDS should be able to check for this kind of attacks.
I would suggest you to read something about process mining in order to have a more precise understanding of these aspects.
  • asked a question related to Firewalls
Question
3 answers
I am working on Master dissertation and I need to use a simulator that I can create the Data Network for Industrial control system and add the firewall with a certain rules in order to test how the well designed network security for ICS can mitigate the cyber attack risk.
Relevant answer
Answer
Maybe CORE can help you, which is described at https://dx.doi.org/10.1109/MILCOM.2012.6415831
  • asked a question related to Firewalls
Question
6 answers
  • How difficult is it to do such research for our major project?
  • To mitigate Injections flaws like SQL injection, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions.We like to introduce an approach to dissect the HTTP traffic and inspect complex SQL injection attacks which uses both a machine learning classifier and a pattern matching inspection engine based on reduced sets of security rules. Our Web Application Firewall architecture aims to optimize detection performances by using a prediction module that excludes legitimate requests from the inspection process.
Relevant answer
Answer
To mitigate Injections flaws like SQL injection, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions.We like to introduce an approach to dissect the HTTP traffic and inspect complex SQL injection attacks which uses both a machine learning classifier and a pattern matching inspection engine based on reduced sets of security rules. Our Web Application Firewall architecture aims to optimize detection performances by using a prediction module that excludes legitimate requests from the inspection process.
  • asked a question related to Firewalls
Question
5 answers
If I can configure my router with different filters then why would I use firewall. If the router can block my network from intruder and my OS has its own soft firewall then why do we need a physical firewall?
Relevant answer
Answer
A firewall or security appliance works on security and may not support advanced routing protocols especially in larger environments.
  • asked a question related to Firewalls
Question
10 answers
Is there a list of attributes or checkpoints to evaluate?
Relevant answer
Answer
please consider concepts of iptables in linux to have better understanding. hope it helps.
  • asked a question related to Firewalls
Question
3 answers
Is there a list of attributes to evaluate when measuring a network firewall weaknesses and vulnerabilities?
Relevant answer
Answer
Dear Kamel, I have already recommend you to learn how ICSA Labs tests the firewalls against a standard set of functional and assurance criteria elements - attributes. Please visit https://www.icsalabs.com/technology-program/firewalls/firewall-product-certification-criteria-evolution. You will never find more detailed list that on that site. Read all the pdf files and you will be able to work out all the necessary attributes. Good luck!
  • asked a question related to Firewalls
Question
4 answers
Current flow solutions are content-unaware, DPI faces problem of encryption, DFI uses both.
Relevant answer
Answer