NETWORK SECURITY:ENSURING MAXIMUM PROTECTION THROUGH FIREWALL

279

NETWORK SECURITY:ENSURING MAXIMUM PROTECTION THROUGH FIREWALL

 ABSTRACT
The connection of an internal network to an external network such as Internet has made it vulnerable to attacks. One class of network attack is unauthorized penetration into network due to the openness of networks. It is possible for an attacker or hackers to sum access to an internal network, this pose great danger to the network and network resources. Our objective and major concern of network design was to build a secured network, based on software firewall that ensured the integrity and confidentiality of information on the network. We proposed an Object-Oriented Methodology and developed an improved software based solution that allows all the inbound and outbound traffic to pass through the firewall. The firewall in turn determines which traffic should be allowed in or out of the network. The firewall algorithm was implemented using Java programming language, which was based on java security architecture. It also utilizes the concept of XML and HTML programming which enables network communication over the Internet.

Chapter one/Introduction

Computer network is the engineering discipline concerned with communication between computer system and devices. The purposes of networking are exchange of data and resources sharing. With network, large volume of data can be exchanged through both short and long-range connections. Likewise computer resources such as hardware (printers, scanner etc.) and software can be remotely shared among network hosts.
With increase reliance on computer network, calls for serious monitoring of the traffic in and out of the system network. Attacker on the internet could break into the network and do harm in a number of ways; they can steal or damage important data, damage individuals computer or their entire network, and use the internal network computer resources. Due to some of these security threats, there was the need to build a defensive mechanism that ensures that attackers and their likes are not allowed into the network. Firewalls are designed to stop unwanted or suspected traffics from flowing into the internal network. Sets of rules are applied to control the type of networking traffic flowing in and out of the system. This would ensure that attackers have no access to the internal network.
This thesis is organized in four chapters. Chapter 2 provides theoretical background information about firewalls, roles, controls and their impact in network security; a comprehensive literature review on how network traffic can be monitored in order to prevent an unauthorized access to internal network. Chapter 3, we proposed and developed an improved software based solution that allows all the inbound and outbound traffic to pass through the firewall which, in turn determines which traffic should be allowed in or out of the network using object-oriented methodology. Chapter 4, Firewall security system was implementation using software-based solution. The use of Java programming language and the concept of xml and html programming were considered in order to achieve our objectives.

1.1 Statement of Problem

The problem to be solved is the problem of organizations network. What can firms do to protect their network over potential threats against the “resources” they share on the network?

1.2 Objectives

  1. To developed a firewall system to block unauthorized access to the network and prevent malicious attack which could lead to data loss
  2. To build a secured network, based on software firewall to protect network resources and ensured the integrity and confidentiality of information on the network are not compromised

1.3 Significance of the Study

The significance of this study is to show how a firewall could prevent attack and protect network resources which will make harder for an attacker to penetrate into the system. The system will be able to offer online services. The probability of exploring vulnerability will be reduced to low risk and the system will be more stable

LEAVE A REPLY

Please enter your comment!
Please enter your name here