Evaluation of Firewall Open Source Software

Diogo Sampaio, Jorge Bernardino

2017

Abstract

Computers systems are virtually in every area of our life, but their use has several risks. This is particularly relevant for small business that are beginning to resort in informatics systems for all their activities, and where a breach of security can have catastrophic consequences. Most risks or security vulnerabilities, besides inadverted errors, originates from criminal activity, which anonymously thrives on the Web and can outbreak any organization, mainly for profit but sometimes just for the challenge of doing it. Consequently, creating and managing a security system is often the main form of precaution and it is the solution that guarantees better success rates. In this paper, we are interested in software with a lower financial cost, therefore our focus is in Free and Open Source Software. To this end, the following types of security tools are analyzed: Firewall and Web Applications Firewall (WAF).

References

  1. Abdul, R., Hur, H. and Shahbaz, S., 2013. Critical analysis on Web applications firewall solutions. IEEE Autonomous Decentralized Systems - ISADS.
  2. Adele Howe, I. Ray, M. Roberts, M. Urbanska, 2012.The Psychology of Security for the Home Computer User. IEEE Symp. on Security and Privacy, pp. 209-223.
  3. Beechey, J., 2009. Web Application Firewalls: Defense in Depth for Your Web Infrastructure.SANS Institute.
  4. Bernardino, J., 2011. Open source business intelligence platforms for engineering education. WEE2011, Lisbon, Portugal, pp. 693-698.
  5. Computer Crime and Security Survey, 2012. 15th Annual Computer Crime and Security Survey 2011/2012. CSI Computer Security Institute.
  6. Dowd, P. W.; McHenry, J. T., 1998. Network security: it's time to take it seriously. Computer, vol.31, no.9, pp.28.
  7. Garantla and Gemikonakli, O., 2009. Evaluation of Firewall Effects on Network Performance. 3rd IT Conf. for next generation, Univ. of East London, UK.
  8. IPCorp, 2016. Official website from www.ipcop.org.
  9. Ironbee, 2016. Official website from www.ironbee.com.
  10. Liang, H., 2010. Understanding Security Behavior. Journal of the Association for Information Systems Vol. 11 Issue 7 pp. 394-413 July 2010.
  11. Meredith, M., 2010. 7 of the best Linux firewalls.Available on techradar.com.
  12. ModSecurity, 2016. Official Website from www.modsecurity.org/
  13. Oppliger, R., 1997. Internet security: firewalls and beyond. Communications of ACM 40, 5 (May 1997), 92-102. DOI=10.1145/253769.253802.
  14. Osmanbegovic and Zahirovic, 2013. Perception of Information Security of Management of Banking and Insurance Companies in Countries of Western Balkans. Research in Applied Economics, Vol. 5 (2).
  15. Palka, D., and Zachara, M., 2011. Learning Web Application Firewall - Benefits and Caveats. Computer Science Volume 6908, 2011, pp 295-308.
  16. Paul van Kessel and Ken Allan, Under cyber attack EY's Global Information, 2013.
  17. Pfsense, 2016. Official website from www.pfsense.org/
  18. Ponemon Institute, 2013 2013 Cost of Cyber Crime Study: United States. Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute, available http://media.scmagazine.com/documents/ 54/2013_us_ccc_report_final_6-1_13455.pdf.
  19. Razzaq, A. Hur, A., Sidra Shahbaz, Muddassar Masood, Farooq Ahmad, H., 2013. Critical Analysis on Web Application Firewall Solutions. 013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
  20. Razzaq, Ahmad, H., Muddassar, M., 2013. Cyber Security: Threats, Reasons, Challenges, Methodologies and State of the Art Solutions for Industrial Applications. Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium, pp 1-6.
  21. Schroder, C., 2012. 5 best open Source firewalls.Available on smallbusinesscomputing.com.
  22. Security Statistics Report, 2012. 12th addition- Industry Benchmarks. official Website.
  23. Sulaman, S., 2011. An Analysis and Comparison of The Security Features of Firewalls and IDSs. Master thesis Performed in ISY (Information Coding).
  24. Tawileh, A., Hilton J. and McIntosh S., 2007. Managing information in smes: a hollistic approach. Highlights of the Information Security Solutions Europe/ SECURE 2007 Conference, UK, pp 331-339.
  25. V. Liggans 2006. The importance of firewall technology. Article conducted for the purpose of applying for a full scholarship for a bachelor's degree in Jonhson C. Smith University.
  26. WebCastellum, 2016. Official Website from www. webcastellum.org/
  27. Zentyal, 2016. Official website from www.zentyal.com.
Download


Paper Citation


in Harvard Style

Sampaio D. and Bernardino J. (2017). Evaluation of Firewall Open Source Software . In Proceedings of the 13th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST, ISBN 978-989-758-246-2, pages 356-362. DOI: 10.5220/0006361203560362


in Bibtex Style

@conference{webist17,
author={Diogo Sampaio and Jorge Bernardino},
title={Evaluation of Firewall Open Source Software},
booktitle={Proceedings of the 13th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},
year={2017},
pages={356-362},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006361203560362},
isbn={978-989-758-246-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,
TI - Evaluation of Firewall Open Source Software
SN - 978-989-758-246-2
AU - Sampaio D.
AU - Bernardino J.
PY - 2017
SP - 356
EP - 362
DO - 10.5220/0006361203560362