Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.


Pedro Ramos Brandao, Coordinator Professor at ISTECJosé Almeida, Master's student in Computing at ISTEC



To cite this article

Pedro Ramos Brandao, José Almeida, Next-Generation Firewalls: Concept, Features, and Their Benefits DOI: 10.31112/kriativ-tech-2021-10-59


A firewall is a solution for securing computer networks; it can be a software program or a hardware device that allows or inhibits access to or from a system. Firewalls are used regularly to prevent untrusted Internet-originating traffic from accessing private systems and networks. All connection requests and packets that intend to pass through the firewall are analyzed according to the configured security criteria and denied or allowed. By rule, firewalls are designed to protect against unauthorized and abusive access. This paper is intended to provide a historical background on the technological evolution of firewalls and present the concept, functionalities, benefits of use, and aspects to be taken into account when choosing and setting firewalls.


Firewall, next-generation firewall, information security, protection, technological evolution.


[1] SÊMOLA, Marcos. Gestão da Segurança da Informação, uma visão Executiva. (Information Security Management, an Executive View). Rio de Janeiro: Elsevier,2003[2] ABNT NBR ISO/IEC 27001:2013 – Tecnologia da Informação – Técnicas de Segurança – Sistemas de gestão da segurança da informação — Requisitos. (Information Technology - Security Techniques - Information Security Management Systems - Requirements).[3] BEAL, Adriana. Segurança da Informação: princípios e melhores práticas para a proteção dos ativos de informação nas organizações (Information Security: principles and best practices for the protection of information assets within organizations) – São Paulo: Atlas, 2005.[4] ABNT NBR ISO/IEC 27002:2013 – Tecnologia da Informação – Técnicas de Segurança – Código de prática para controles de segurança da informação. (Information Technology - Security Techniques - Code of practice for information security controls).[5] KUROSE James F., ROSS, Keith W. (2010), Redes de Computadores e a Internet 5a. Edição. (Computer Networks and the Internet 5th Edition). 2010. Pearson Publishing.[6] CHAURE, Rupali. An Implementation of Anomaly Detection Mechanism for Centralized and Distributed Firewalls. NRI Institute of Information Science and Technology. 2010. Bhopal, India.[7] Tanenbaum, Andrew S. Redes de Computadores - Tradução da 4ª Edição. (Computer Networks - Translation of the 4th Edition). 2003. Editora Campus / Elsevier (Campus / Elsevier Publisher)[8] Kagermann H., Wahlster, W., & Helbig, J. Recommendations for implementing the strategic initiative Industrie 4.0, Final report of the Industrie 4.0 Working Group. 2013[9] Ashibani, Y. & Mahmoud, H. M. Cyber-physical systems security: Analysis, challenges, and solutions. Computers & Security. 2017[10] Ahram, T., Arman, S., Saman, S., Daniels, J., & Amaba, B. Blockchain Technology Innovations. Conference:  IEEE-Technology-and-Engineering-Management-Society Conference. 2017[11] Babiceanu, R.  F., & Seker, R. Cybersecurity and resilience modeling for software-defined networks-based manufacturing application. In:  Service Orientation in Holonic and Multi-Agent Manufacturing. Studies in Computational Intelligence. Springer, Cham. 2017[12] Corallo, A., Lazo, i M., & Lezzi, M. Cybersecurity in the context of industry 4.0:  A structured classification of critical assets and business impacts. Science Direct, Elsevier, Computers in Industry. 2020[13] Dimase, D., Collier, Z.A., Heffner, K., et al. Systems engineering framework for cyber-physical security and resilience. 2015[14] European Union Agency for Network and Information Security (ENISA). Good Practice for Security of Internet of Things in the Context of Smart Manufacturing, ENISA. 2018[15] Greitzer, F. L., J., Purl, Y. M., & Leong P. J. S. Positioning your organization to respond to insider threats. IEEE Engineering Management Review. 2019[16] Industrial Control Systems Cyber Emergency Response Team ICS-CERT. Annual Assessment Report. National Cybersecurity and Communications Integration Center (NCCIC). 2016[17] Kaplan J., Weinberg, A., & Sharma, S. Meeting the cybersecurity challenge. Digit. McKinsey. 2011[18] Liu, Y., &Xu, X. Industry 4.0 and cloud manufacturing: A comparative analysis. Journal of Manufacturing Science and Engineering. 2017[19] Lu, T., Lin J., Zhao, L., Li, Y., & Peng, Y. A security architecture in cyber-physical systems:  security theories, analysis simulation, and application fields. 2015[20] National   Security   &   Defense. Memorandum on   Space   Policy   Directive   5 –Cybersecurity. 2020[21] Zhu, Q., Craig, R., & Basar, T. A hierarchical security architecture for cyber-physical systems. In:  2011 4th International Symposium on Resilient Control Systems. 2011[22] Theron, P., & Lazari, A. The IACS Cybersecurity Certification Framework (ICCF). Lessons from the 2017 study of state of the art., EUR 29237 EN, Publications Office of the European Union, Luxembourg, ISBN 978-92-79-85968-7, 10.2760/856808, JRC111611. 2018[23] Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., & Hahn, A. NIST Special Publication 800-82.  Guide to Industrial Control Systems (ICS) Security. National Institute of Standard and Technology (NIST). 2015[24] Fortinet the Next Step in Enterprise Firewall Evolution.[25] Gartner. Available at: 2015[26] MANECA, Miguel António Moreira Boavida. Firewalls: A Próxima Geração, 2018. (The Next Generation, 2018).[27]. Shinder T.W., Shimonski R.J., Shinder D.L., 2003, The Best Damn Firewall Book Period" Syngress Publishing, Rockland.[28] Y. Yongxin, 2011, The comparative study on network firewalls performance, 2011 IEEE 3rd International Conference on Communication Software and Networks.[29] GARTNER Global Research and Advisory Company.[30] GARTNER Peer Insights.[31] Palo Alto Networks.[32] Fortinet.