Research on Security Weakness Using Penetration Testing in a Distributed Firewall

被引:2
|
作者
Tudosi, Andrei-Daniel [1 ]
Graur, Adrian [1 ]
Balan, Doru Gabriel [1 ]
Potorac, Alin Dan [1 ]
机构
[1] Stefan Cel Mare Univ Suceava, Dept Comp Elect & Automat, Suceava 720229, Romania
关键词
application virtualization; distributed firewall; platform virtualization; risk analysis; virtual private networks;
D O I
10.3390/s23052683
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The growing number of cyber-crimes is affecting all industries worldwide, as there is no business or industry that has maximum protection in this domain. This problem can produce minimal damage if an organization has information security audits periodically. The process of an audit includes several steps, such as penetration testing, vulnerability scans, and network assessments. After the audit is conducted, a report that contains the vulnerabilities is generated to help the organization to understand the current situation from this perspective. Risk exposure should be as low as possible because in cases of an attack, the entire business is damaged. In this article, we present the process of an in-depth security audit on a distributed firewall, with different approaches for the best results. The research of our distributed firewall involves the detection and remediation of system vulnerabilities by various means. In our research, we aim to solve the weaknesses that have not been solved to date. The feedback of our study is revealed with the help of a risk report in the scope of providing a top-level view of the security of a distributed firewall. To provide a high security level for the distributed firewall, we will address the security flaws uncovered in firewalls as part of our research.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Enhanced SDN Security using Firewall in a Distributed scenario
    Satasiya, Dhaval
    Raviya, Rupal
    Kumar, Hiresh
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 588 - 592
  • [2] Implementing distributed Internet security using a firewall collaboration framework
    Thames, J. Lane
    Abler, Randal
    [J]. PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 680 - 685
  • [3] Study of distributed firewall based security system
    Liu, Zhe
    Wang, Wei-Ran
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2005, 34 (03): : 351 - 354
  • [4] Security at the Network Edge: A distributed firewall architecture
    Markham, T
    Payne, C
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 279 - 286
  • [5] A STUDY OF NETWORK SECURITY USING PENETRATION TESTING
    Shanmugapriya, R.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 371 - 374
  • [6] A Research of Distributed Security and QoS Testing Framework
    Liu, Zhibin
    Liu, Ziang
    Huang, Yuanyuan
    Liu, Xin
    Zhou, Xiaokang
    Zhou, Rui
    [J]. 2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 174 - 181
  • [7] Research on Computer Security and Firewall Technology
    Chen, Ping
    [J]. PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 257 - 260
  • [8] Firewall security: Policies, testing and performance evaluation
    Lyu, MR
    Lau, LKY
    [J]. 24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 116 - 121
  • [9] Assessment of Website Security by Penetration Testing Using Wireshark
    Sandhya, S.
    Purkayastha, Sohini
    Joshua, Emil
    Deep, Akash
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [10] Research and Design on Distributed Firewall based on LAN
    Xiong Zeng-gang
    Zhang Xue-min
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 517 - 520