Layer7 Application Firewalls
Layer7 Application Firewalls
Layer7 Application Firewalls
Project: Layer Seven Firewalls Client: Educational Revision: 1 0 Author: Matthew Ruck
Introduction
The firewall, the first line of defense in many network security plans, has existed for decades. The purpose of the firewall is straightforward; permit authorized data to enter and exit the trusted network while preventing unauthorized traffic from doing so. Interestingly, the makeup and methodology of the firewall has not changed as rapidly as the systems and applications it intends to protect. Over the years, enhancements certainly have occurred within perimeter security; however, the overall methodology of the firewall has not radically changed. Present-day threats in information security require a new firewall technology called application layer filtering, otherwise known deep packet inspection. The purpose of this paper is to describe why application firewalls are quickly becoming a requirement for all corporate computer networks.
Traditional Firewalls
Before detailing application firewall functions and capabilities, it is important to understand how traditional firewalls behave. Since their inception, firewalls have been driven by rules and policies codified by a communications engineer. Most firewalls in use today operate by the session (sender / recipient), and by the packet. Firewalls receive packets of data, which is comprised of header information, and the payload, which is the actual data intended for transmission. Traditional firewalls read information from the packet header that determines what the firewall ought to do with the packet (Ingham, 2002). The rules that determine what the packet filtering firewall is going to do- the policies- are largely static in nature. Put into information technology terms, traditional firewalls operate at the data link, network, and transport layers of the Open System Interconnection (OSI) model (Proch, 2009). Accordingly, a traditional firewall can look into the header of a packet and determine basic information; such as where the packet came from, where it wants to go, and what port it intends to travel on. For example, a packet coming into a firewall might have a header that indicates that it originated from a specific IP number A, intends to deliver its payload to IP number B and is traversing transmission port protocol (TCP) number twenty-three (Clarke, 2009). Based on this information, the firewall then decides either to allow or deny access. This relatively simple rule-based system has worked for a long time, but is quickly becoming only the starting point in gateway threat protection.
PAGE | 2
Project: Layer Seven Firewalls Client: Educational Revision: 1 0 Author: Matthew Ruck
PAGE | 3
Project: Layer Seven Firewalls Client: Educational Revision: 1 0 Author: Matthew Ruck
(Proch, 2009). Finally, the devices need to keep up with the network interface. This is a real-time active scanning solution. The process of inspecting packets cannot interfere with data transmission.
Conclusion
Traditional firewalls have worked well for many years. They operate on basic rules that rely on packet header information. Historically, this information alone was enough to filter out those with a malicious intent. The device did not need to analyze payload data to make this determination. Unfortunately, the internet threat environment has irreversibly changed. Identification of data type by packet header and TCP port is no longer reliable. As demonstrated in this article, malicious code can easily masquerade itself as benign web traffic, or other legitimate web-based services. Preventing malicious code from entering the trusted network requires active inspection of data. Application aware firewalls identify data type by application signature. Armed with this intelligence, the device is in a superior position to determine how data should behave. Data that does not conform to the parameters of the device is not permitted to enter the trusted network. Application firewalls will quickly overtake traditional firewalls as the mandatory method for preventing network intrusions.
PAGE | 4
Project: Layer Seven Firewalls Client: Educational Revision: 1 0 Author: Matthew Ruck
References
Bradbury, D. (2009). Securing e-business with web application firewalls. Computer Weekly , 18. Clarke, J. (2009). Resilience under attack: Techniques for continuing online business in the face of security compromise. Journal of Business Continuity & Emergency Planning , 3(3), 222-226. Retrieved October 17, 2009 from Business Source Complete. Greene, T. (2004, February 2). The evolution of application layer firewalls . Retrieved October 17, 2009, from Network World: http://www.networkworld.com/news/2004/0202specialfocus.html Ingham, K. F. (2002). A History and Survey of Network Firewalls. The University of New Mexico, Computer Science Department , 1-42. Retrieved October 17, 2009 from Business Source Complete. Magalhaes, R. (2008, June 25). The Difference Between Application and Session Layer Firewalls. Retrieved October 17, 2009, from WindowsSecurity.com: http://www.windowsecurity.com/articles/Difference-Between-Application-Session-LayerFirewalls.html Proch, D. &. (2009). Plumb The Depths Of Deep Packet Inspection. Electronic Design , 57(16), 47-50. Retrieved October 17, 2009 from Business Source Complete.
PAGE | 5