Saurabh & Sandeep - Final
Saurabh & Sandeep - Final
Saurabh & Sandeep - Final
Chapter 1
Introduction
1.1 Objective
1.2 Scope
1.3 Overviews
The SRS establishes requirements for the Firewall system application software. This document
shall be used as a reference for the Software Design Document (SDD). This project is aimed to
facilitate the controlling of various computers from the viruses .As we know that in the present
IT world it’s a very difficult task to protect our computers.
Nowadays, security becomes more and more important. Firewall system is the solution to
enhance system security. Beside of basic password authorization, The Administrator will
generate a string and store it into the Firewall system and windows registry so as to start the
system.[1]
1.1 Objective:-
In order to secure our corporate network, we must define our idea of a network
perimeter. We need to determine what things must be protected, develop a security
policy, and establish mechanisms to enforce the policy and methods we are going to
employ.
.
These mechanisms must come after our security policy is developed, not before. To
define a security mechanism that will protect our corporate site, in specific firewalls, and
to provide us with the prerequisites to implement it. Security policies vary from
organization, of course, but one issue that will set these policies aside will be platform for
what they are being developed. We must look closely at the platform we’ll be choosing,
as it will definitely define all future projects, level of security and consequently the
security policy being developed. That’s why a security policy must come first to
guarantee the success of the mechanisms that will be implemented.
As a LAN or web administrator, one already knows that the hardest part of connecting his
corporation to the Internet is not justifying the expense or effort, but convincing
management that it is safe to do so, especially at a large company. A firewall not only
adds real security, but also plays an important role as a security blanket for management
1.2 Scope :-
A firewall basically a protective device. If we are building a firewall, the first thing we need to
worry about is what we’re trying to protect. When we connect to the Internet, we’re putting three
things at risk:
A firewall is a system of hardware and software components designed to restrict access between
or among networks, most often between the Internet and a private Internet.
The firewall is part of an overall security policy that creates a perimeter defense designed
to protect the information resources of the organization.
A Firewall separates a protected network from an unprotected one, the Internet. A firewall is
a piece of software or hardware that filters all network traffic between our computer, home
network, or company network and the Internet. It is our position that everyone who uses the
Internet needs some kind of firewall protection.
Data: the information kept on the computers
Resources: the computers themselves
Reputation
Since this software deals with security hence it can be used for securing personal data.
Can be used in colleges and universities for securing confidential data.
Can be used in banks for safety deposits and securing account information
1.3 Overview:-
Firewalls are network devices which enforce an organization's security policy. Since their
development, various methods have been used to implement firewalls. These methods fillter
network traffic at one or more of the seven layers of the.ISO network model, most commonly at
the application ,transport, and network, and data-link levels. In addition, researchers have
developed some newer methods, such as protocol normalization and distributed firewalls, which
have not yet been widely adopted.
Firewalls involve more than the technology to implement them. Specifying a set of filltering
rules, known as a policy, is typically complicated and error-prone. High-level languages have
been developed to simplify the task of correctly defining a firewall's policy. Once a policy has
been specified, the firewall needs to be tested to determine if it actually implements the policy
correctly.Little work exists in the area of firewall theory; however, this article summarizes what
exists. Because some data must be able to pass in and out of a firewall, in order for the protected
network to be useful, not all attacks can be stopped by firewalls. Some emerging technologies,
such as Virtual Private Networks (VPN) and peer-to-peer networking pose new challenges for
firewalls.
Our basic need and problem is to provide trusted and secure acess level to the user When we
connect to the Internet, we’re putting three things at risk: Data,the information kept on the
computers, Resources, the computers themselves, Reputation. So we basically need a protective
device.
We need a software whose basic task is to regulate some of the flow of traffic between computer
networks of different trust levels. Typical examples are the Internet, which is a zone with no
trust, and an internal network, which is a zone of higher trust.
OVERALL
DESCRIPTION
Chapter 2
The Overall Description
2.1 Product Perspective
2.1.1 System Interfaces
2.1.2 Hardware Interfaces
2.1.3 Software Interfaces
2.1.4 Communications Interfaces
2.1.5 Memory Constraints
2.1.6 Operations
2.2 Product Functions
2.3 User Characteristics
2.4 Constraints
2.5 Assumptions and Dependencies
2.1 Product Perspective:-
2.1.1 System Interfaces:-
2.1.3 Software Interfaces:-
Development:-
Deployment:-
2.1.4 Communications Interfaces:-
The Firewall system with its LAN file communicates with the Operating System of the
computer.
During development:-
Primary Memory: - 128 Mb, efficiently
Secondary Memory: - 512Mb
2.1.6 Operations:-
2.2 Product Functions:-
2.4 Constraints:-
Interface to other applications is that the Firewall system makes an interface with the
Operating system of the computer.
Safety and security considerations are that the user must take care of the Firewall system.
Dependencies
The only main dependency of this software is the user name and password, without the user
name and password will not be able to start the Firewall system.
[][][][]
SPECIFIC
REQUIREMENTS
Chapter 3
Specific Requirements
3.0 External interface requirements
3.1 Performance Requirements
3.2 Design Constraints
3.3 Software system attributes
3.3.1 Reliability
3.3.2 Availability
3.3.3 Security
3.3.4 Maintainability
3.3.5 Portability
3.4 Organizing the Specific Requirements
3.4.1 System Mode
3.4.2 Feature
3.3.5 Portability:-
This software is portable. It does not require any specific need to look upon. This software can
easily been moved since it takes less space and totally depends on the Internet and system for its
function and operation.
3.4 Organizing the Specific Requirements:-
3.4.1 System Mode:-
At a time this software can only perform on a single system. Hence the system mode of this
system is single mode.
3.4.2 Feature:-
As the software is in the initial prospective view. Hence this will require modifications. thus as
the client want to make modifications he/she can make an call or for beneficiary he can send us
an E-mail regarding what changes has to be made.
The mail should be sending to the developer so that he can avail the regarding changes as
required by the client.
SYSTEM
OVERVIEW
Chapter 5
System Overview
The process determines whether the inbound or outbound traffic should be allowed or denied.
This was dilated for the necessary activities and tasks needed in the creation of the proposed
software based firewall system.
Level 0:-
Level 1:-
DESIGN
CONSIDERATION
Chapter 6
Design Considerations
Assumptions
Dependencies
The Goal of this software is to provide security constraints. The use of this software makes the
user secure from any intruder’s brute force attack.
This software is easy to use and needs low maintenance.
To provide the people in your organization with access to the WWW without
allowing the entire world to peak in;
To erect a barrier between an untrusted piece of software,your organization’s public Web
server, and the sensitive information that resides on your private network
The possible guidelines which are being referred during the orientation of this software will be as
follows:-
The Iterative Model is used for developing this software. It is because Iterative and Incremental
development is at the heart of a cyclic software development process developed in response to the
weaknesses of the waterfall model. It starts with an initial planning and ends with deployment with the cyclic
interactions in between. Iterative and incremental development is essential parts of the Rational Unified
Process.
ARCHITECURAL
CONCEPT
Chapter 7
System Architecture
This software has been inspires by the software “FIREWALL PROTECTOR” which has the
capability to lock and unlock the site using Firewall system device. Hence the same phenomena
are used in our project with a little variation.
The basic motive of our software is to secure the PC from the unauthorized access and this can
only be done through system start-up process must be handled by the admin through a Firewall
system.
The Input of this software will be the user-id and password of the Administrator and the output
will be the lock the unauthorized site of the system.
To have a better view over the mechanism and functionality of the modules Use-case Diagram
and Process Flow Diagram are provided.
UNMATCHED
Process Flow Diagram
POLICIES AND
TECTICS
Chapter 8
Policies and Tactics
Black Box Testing: - Black-box testing is a method of software testing that tests the functionality of an
application as opposed to its internal structures or workings (see white-box testing). Specific
knowledge of the application's code/internal structure and programming knowledge in general is not
required. Test cases are built around specifications and requirements, i.e., what the application is
supposed to do. It uses external descriptions of the software, including specifications, requirements,
and designs to derive test cases. These tests can be functional or non-functional, though usually
functional. [8]
It is classified as:-
Boundary value analysis: - Boundary value analysis is a software testing technique in which tests are
designed to include representatives of boundary values. Values on the edge of an equivalence
partition or at the smallest value on either side of an edge. The values could be either input or output
ranges of a software component. Since these boundaries are common locations for errors that result in
software faults they are frequently exercised in test cases.
White box testing: - White-box testing is a method of testing software that tests internal structures or
workings of an application, as opposed to its functionality (i.e. black-box testing). In white-box testing
an internal perspective of the system, as well as programming skills, are required and used to design
test cases. The tester chooses inputs to exercise paths through the code and determine the appropriate
outputs. This is analogous to testing nodes in a circuit, e.g. in-circuit testing (ICT).[9]
Integration testing: - Integration testing (sometimes called Integration and Testing, abbreviated
"I&T") is the phase in software testing in which individual software modules are combined and tested
as a group. It occurs after unit testing and before system testing. Integration testing takes as its
input modules that have been unit tested, groups them in larger aggregates, applies tests defined in an
integration test plan to those aggregates, and delivers as its output the integrated system ready
for system testing .
Big bang: - In this approach, all or most of the developed modules are coupled together to form
a complete software system or major part of the system and then used for integration testing.
The Big Bang method is very effective for saving time in the integration testing process.
However, if the test cases and their results are not recorded properly, the entire integration
process will be more complicated and may prevent the testing team from achieving the goal of
integration testing.
System testing: - System testing of software or hardware is testing conducted on a complete, integrated
system to evaluate the system's compliance with its specified requirements. System testing falls within
the scope of black box testing, and as such, should require no knowledge of the inner design of the
code or logic.
In engineering, maintainability is the ease with which a product can be maintained in order to:
correct defects
meet new requirements
make future maintenance easier, or
cope with a changed environment
DETAILED DESIGN
Chapter 9
The packet filtering systems route packets between internal and external hosts, but they do it
relationally. They allow or block certain types of packets in a way that reflects a site’s own
security as shown in Figure. The type of router Firewall used in a package filtering firewall is
known as a screening router.
Every packet has a set of headers containing certain information. This information is highly
essential to the router and it includes; IP source address, IP destination address,Protocol (whether
the packet is a TEP, UDP, or ICMP packet, TCP or UDP source port, TCP or UDP destination
port, and ICMP message type.Most of the existing firewall systems are implemented on
hardware, that is, they are hardware based. Because of the hardware platform, the firewalls have
the following shortcomings: they are very expensive; being hardware based, most of the firewall
requires extensive configuration procedure.
Network administrators are specially trained to handle the firewall system; each vendor has
specific configuration procedures for their firewall systems.The implication of this is that the
knowledge in one firewall system may not be applicable in another system; most of the hardware
based firewall system cannot be upgraded. The limitations of the hardware based firewall are
reasons for our adoption and the implementation of software based approach to firewall
development.
History:Firewalls have existed since about 1987, and several surveys and histories have already
been written. However, none of them provide both the depth and breadth of this survey, nor do
they focus on the peer-reviewed literature describing firewall technology.
In [1994], Alec Muffett wrote a paper which provided an excellent review of the firewall policies
and architectures of the time. This paper was aimed at people considering implementing a
firewall, describing the technologies which they might select, their tradeoffs, and how to
maintain a firewall. One section of the Internet standards document RFC 1636 [Braden et al.
1994] is about the status of firewalls as of February, 1994. In this section, they discuss the
problem of false security that a firewall often provides to an organization behind one.They also
review the concepts of application- and transport-level proxies, as well as simple packet filtering.
A review of firewalls and their technology appeared in Spectrum [Lodin and Schuba 1998]. This
paper is an excellent description of firewalls and their technology at the time it was written. Also
in [1998], Rik Farrow wrote a firewall product analysis which was related to the CSI _rewall
comparison for that year. This analysis is aimed at management and people just arriving at
firewalls, and provides them with the background information they would need to talk with a
firewall vendor intelligently.
Survey:
A brief description of our designed software based firewall system for network security is as
follows. The software firewall system has the following description; it accepts inbound network
traffic and analysis the following: IP source address, Protocol destination address, Protocol (TCP
or UDP), and ICMP message type. We applied the policy table probe on the traffic information.
The results of the probe were passed into the underlying firewall algorithm that initiated the
decision making process. Given figure is the flow chart for the firewall algorithm.
Figure :Firewall System Flowchart
The process determines whether the inbound or outbound traffic should be allowed or denied.
This was dilated for the necessary activities and tasks needed in the creation of the proposed
software based firewall system.
CONCLUSIONS
Chapter 10
Conclusions
Information security has become an important concept in any organizations due to the
fact that an unprotected information system can be exposed to danger in a network as a
result of penetration tools at the disposal of hackers and crackers. Therefore, there was
need to ensure adequate protection of internal network from hackers. To achieve this,
there are so many tools at the disposal of the network administrator and the security
administrator, which include; IPS (Inclusion Prevention System),
Firewall Security System and the IDS (Inclusion Detection System). This work
focused on the firewall system that filtered what goes in and comes out of the network. It
had the ability to block an unauthorized traffic and allow authorized traffic using the IP
(Internet Protocol) table. The firewall algorithm was implemented using Java
programming language, which was based on java security architecture.
Definitions:-
• A firewall is a system of hardware and software components designed to restrict access
between or among networks, most often between the Internet and a private Internet.
• The firewall is part of an overall security policy that creates a perimeter defense designed
to protect the information resources of the organization.
• Two goals:
– To provide the people in your organization with access to the WWW without
allowing the entire world to peak in;
– To erect a barrier between an untrusted piece of software,your organization’s
public Web server, and the sensitive information that resides on your private
network.
• Basic idea:
– Impose a specifically configured gateway machine between the outside world and
the site’s inner network.
– All traffic must first go to the gateway, where software decide whether to allow or
reject.
References:-
Web
1. http://en.wikipedia.org/wiki/Iterative_and_incremental_development
2. http://en.wikipedia.org/wiki/Black-box_testing
3. http://en.wikipedia.org/wiki/White-
box_testinghttp://www.developerfusion.com/article/84338/making-usb-c-
friendly/http://www.codeproject.com/KB/system/usbeject.aspx
Books Referred:-