{"id":66384,"date":"2021-10-26T09:22:01","date_gmt":"2021-10-26T09:22:01","guid":{"rendered":"https:\/\/www.kriativ-tech.com\/?p=66384"},"modified":"2022-01-04T14:25:23","modified_gmt":"2022-01-04T14:25:23","slug":"next-generation-firewalls-concept-features-and-their-benefits","status":"publish","type":"post","link":"https:\/\/www.kriativ-tech.com\/?p=66384","title":{"rendered":"Next-Generation Firewalls: Concept, Features, and Their Benefits"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243;]Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;679012&#8243;]Pedro Ramos Brandao, Coordinator Professor at ISTEC<br \/>\nJos\u00e9 Almeida, Master&#8217;s student in Computing at ISTEC<br \/>\n[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2021%2F10%2FNextGenerationFirewallsConceptFeaturesTheirBenefits.pdf|target:_blank&#8221; button_color_type=&#8221;uncode-palette&#8221; uncode_shortcode_id=&#8221;111627&#8243;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243; uncode_shortcode_id=&#8221;207108&#8243;]Pedro Ramos Brandao, Jos\u00e9 Almeida,\u00a0<strong>Next-Generation Firewalls: Concept, Features, and Their Benefits <\/strong><\/p>\n<p>DOI: 10.31112\/kriativ-tech-2021-10-59[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;176705&#8243;]A firewall is a solution for securing computer networks; it can be a software program or a hardware device that allows or inhibits access to or from a system. Firewalls are used regularly to prevent untrusted Internet-originating traffic from accessing private systems and networks. All connection requests and packets that intend to pass through the firewall are analyzed according to the configured security criteria and denied or allowed. By rule, firewalls are designed to protect against unauthorized and abusive access. This paper is intended to provide a historical background on the technological evolution of firewalls and present the concept, functionalities, benefits of use, and aspects to be taken into account when choosing and setting firewalls. [\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;122087&#8243;]Firewall, next-generation firewall, information security, protection, technological evolution.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;930204&#8243;][1] S\u00caMOLA, Marcos. Gest\u00e3o da Seguran\u00e7a da Informa\u00e7\u00e3o, uma vis\u00e3o Executiva. (Information Security Management, an Executive View). Rio de Janeiro: Elsevier,2003<\/p>\n<p>[2] ABNT NBR ISO\/IEC 27001:2013 \u2013 Tecnologia da Informa\u00e7\u00e3o \u2013 T\u00e9cnicas de Seguran\u00e7a \u2013 Sistemas de gest\u00e3o da seguran\u00e7a da informa\u00e7\u00e3o \u2014 Requisitos. (Information Technology &#8211; Security Techniques &#8211; Information Security Management Systems &#8211; Requirements).<\/p>\n<p>[3] BEAL, Adriana. Seguran\u00e7a da Informa\u00e7\u00e3o: princ\u00edpios e melhores pr\u00e1ticas para a prote\u00e7\u00e3o dos ativos de informa\u00e7\u00e3o nas organiza\u00e7\u00f5es (Information Security: principles and best practices for the protection of information assets within organizations) \u2013 S\u00e3o Paulo: Atlas, 2005.<\/p>\n<p>[4] ABNT NBR ISO\/IEC 27002:2013 \u2013 Tecnologia da Informa\u00e7\u00e3o \u2013 T\u00e9cnicas de Seguran\u00e7a \u2013 C\u00f3digo de pr\u00e1tica para controles de seguran\u00e7a da informa\u00e7\u00e3o. (Information Technology &#8211; Security Techniques &#8211; Code of practice for information security controls).<\/p>\n<p>[5] KUROSE James F., ROSS, Keith W. (2010), Redes de Computadores e a Internet 5a. Edi\u00e7\u00e3o. (Computer Networks and the Internet 5th Edition). 2010. Pearson Publishing.<\/p>\n<p>[6] CHAURE, Rupali. An Implementation of Anomaly Detection Mechanism for Centralized and Distributed Firewalls. NRI Institute of Information Science and Technology. 2010. Bhopal, India.<\/p>\n<p>[7] Tanenbaum, Andrew S. Redes de Computadores &#8211; Tradu\u00e7\u00e3o da 4\u00aa Edi\u00e7\u00e3o. (Computer Networks &#8211; Translation of the 4th Edition). 2003. Editora Campus \/ Elsevier (Campus \/ Elsevier Publisher)<\/p>\n<p>[8] Kagermann H., Wahlster, W., &amp; Helbig, J. Recommendations for implementing the strategic initiative Industrie 4.0, Final report of the Industrie 4.0 Working Group. 2013<\/p>\n<p>[9] Ashibani, Y. &amp; Mahmoud, H. M. Cyber-physical systems security: Analysis, challenges, and solutions. Computers &amp; Security. 2017<\/p>\n<p>[10] Ahram, T., Arman, S., Saman, S., Daniels, J., &amp; Amaba, B. Blockchain Technology Innovations. Conference:\u00a0 IEEE-Technology-and-Engineering-Management-Society Conference. 2017<\/p>\n<p>[11] Babiceanu, R.\u00a0 F., &amp; Seker, R. Cybersecurity and resilience modeling for software-defined networks-based manufacturing application. In:\u00a0 Service Orientation in Holonic and Multi-Agent Manufacturing. Studies in Computational Intelligence. Springer, Cham. 2017<\/p>\n<p>[12] Corallo, A., Lazo, i M., &amp; Lezzi, M. Cybersecurity in the context of industry 4.0:\u00a0 A structured classification of critical assets and business impacts. Science Direct, Elsevier, Computers in Industry. 2020<\/p>\n<p>[13] Dimase, D., Collier, Z.A., Heffner, K., et al. Systems engineering framework for cyber-physical security and resilience. 2015<\/p>\n<p>[14] European Union Agency for Network and Information Security (ENISA). Good Practice for Security of Internet of Things in the Context of Smart Manufacturing, ENISA. 2018<\/p>\n<p>[15] Greitzer, F. L., J., Purl, Y. M., &amp; Leong P. J. S. Positioning your organization to respond to insider threats. IEEE Engineering Management Review. 2019<\/p>\n<p>[16] Industrial Control Systems Cyber Emergency Response Team ICS-CERT. Annual Assessment Report. National Cybersecurity and Communications Integration Center (NCCIC). 2016<\/p>\n<p>[17] Kaplan J., Weinberg, A., &amp; Sharma, S. Meeting the cybersecurity challenge. Digit. McKinsey. 2011<\/p>\n<p>[18] Liu, Y., &amp;Xu, X. Industry 4.0 and cloud manufacturing: A comparative analysis. Journal of Manufacturing Science and Engineering. 2017<\/p>\n<p>[19] Lu, T., Lin J., Zhao, L., Li, Y., &amp; Peng, Y. A security architecture in cyber-physical systems:\u00a0 security theories, analysis simulation, and application fields. 2015<\/p>\n<p>[20] National\u00a0\u00a0 Security\u00a0\u00a0 &amp;\u00a0\u00a0 Defense. Memorandum on\u00a0\u00a0 Space\u00a0\u00a0 Policy\u00a0\u00a0 Directive\u00a0\u00a0 5 \u2013Cybersecurity. <a href=\"https:\/\/www.whitehouse.gov\/presidential-actions\/memorandum-space-policy-directive-5-cybersecurity-principles-space-systems\">https:\/\/www.whitehouse.gov\/presidential-actions\/memorandum-space-policy-directive-5-cybersecurity-principles-space-systems<\/a>. 2020<\/p>\n<p>[21] Zhu, Q., Craig, R., &amp; Basar, T. A hierarchical security architecture for cyber-physical systems. In:\u00a0 2011 4th International Symposium on Resilient Control Systems. 2011<\/p>\n<p>[22] Theron, P., &amp; Lazari, A. The IACS Cybersecurity Certification Framework (ICCF). Lessons from the 2017 study of state of the art., EUR 29237 EN, Publications Office of the European Union, Luxembourg, ISBN 978-92-79-85968-7, 10.2760\/856808, JRC111611. 2018<\/p>\n<p>[23] Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., &amp; Hahn, A. NIST Special Publication 800-82.\u00a0 Guide to Industrial Control Systems (ICS) Security. National Institute of Standard and Technology (NIST). 2015<\/p>\n<p>[24] Fortinet the Next Step in Enterprise Firewall Evolution. <a href=\"https:\/\/www.fortinet.com\/blog\/industry-trends\/the-next-step-in-enterprise-firewall-evolution\">https:\/\/www.fortinet.com\/blog\/industry-trends\/the-next-step-in-enterprise-firewall-evolution<\/a><\/p>\n<p>[25] Gartner. Available at: <a href=\"http:\/\/www.gartner.com\/it-glossary\/next-generationfirewalls-ngfws\">http:\/\/www.gartner.com\/it-glossary\/next-generationfirewalls-ngfws<\/a>. 2015<\/p>\n<p>[26] MANECA, Miguel Ant\u00f3nio Moreira Boavida. Firewalls: A Pr\u00f3xima Gera\u00e7\u00e3o, 2018. (The Next Generation, 2018).<\/p>\n<p>[27]. Shinder T.W., Shimonski R.J., Shinder D.L., 2003, The Best Damn Firewall Book Period&#8221; Syngress Publishing, Rockland.<\/p>\n<p>[28] Y. Yongxin, 2011, The comparative study on network firewalls performance, 2011 IEEE 3rd International Conference on Communication Software and Networks.<\/p>\n<p>[29] GARTNER Global Research and Advisory Company. <a href=\"http:\/\/www.gartner.com\">www.gartner.com<\/a><\/p>\n<p>[30] GARTNER Peer Insights. <a href=\"https:\/\/www.gartner.com\/reviews\/market\/network-firewalls\">https:\/\/www.gartner.com\/reviews\/market\/network-firewalls<\/a><\/p>\n<p>[31] Palo Alto Networks. <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/datasheets\/pa-7000-series\">https:\/\/www.paloaltonetworks.com\/resources\/datasheets\/pa-7000-series<\/a><\/p>\n<p>[32] Fortinet. <a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/data-sheets\/FortiGate_7000_Series_Bundle.pdf\">https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/data-sheets\/FortiGate_7000_Series_Bundle.pdf<\/a>[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pedro Ramos Brandao, Coordinator Professor at ISTEC<br \/>\nJos\u00e9 Almeida, Master&#8217;s student in Computing at ISTEC<br \/>\nDOI: 10.31112\/kriativ-tech-2021-10-59<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70],"tags":[],"_links":{"self":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66384"}],"collection":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66384"}],"version-history":[{"count":4,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66384\/revisions"}],"predecessor-version":[{"id":66434,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66384\/revisions\/66434"}],"wp:attachment":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}