Title: Firewall Survey
1Firewall Survey
- By Agnieszka Wosko
- and
- Jun Chen
CIS600 Internet Security Principles Spring
2001Interim Project Status Report
2Project Description
Survey the state of the art in firewall
protection. Firewalls are used at network
connection points to keep malicious people out of
your systems. What are good firewalls for
personal, business, e-commerce, Government, and
educational entities? What are their limitations
(in terms of attack coverage, event logging, data
recording, etc)? Do they have provisions for
dynamic code detection (virus which travels)? Is
there any attack detection? Â
3Project Team Members and Their Roles
- Agnieszka Wosko awosko_at_ecs.syr.edu
- Spokeswoman, Researcher and Writer
- Jun Chen jchen12_at_syr.edu
- Researcher, Web Researcher and Design Consultant
4Focus Areas
- Firewall Application
- Its Objectives
- Authentication
- Access control
- Confidentiality
- Integrity in various environments
5Focus Areas (cont)
- Functional overview
- Overview of the performance and testing
- Overview of the products components (platforms,
hardware and software)
6Current Literature Sources
- A. Silberschatz and P.B. Galvin. Operating System
Concepts 5th ed. John Willey and Sons, Inc. 1999. - J.F. DiMarzio. Network Architecture and Design.
Chapter 11. Securing Your Network Sams
Publishing. 2001.
7Current Literature Sources (cont)
- T. Ogletree. Practical Firewalls. Que. 2000
- B. Komar, J. Wettern, R. Beekelar. Firewalls for
Dummies. Hungry Minds. 2001
8Current Internet Sources
- www.oulink.com Firewall Report
- www.greatcircle.com/gca/tutorial/main.html
Firewall Tutorial by Great Circle Associates
Internet Tutorials - www.firewallguide.com Information and Current
articles about security - www.firewall.com
9Successful Progress So Far
- Literature research and overview of the relevant
chapters to extract the needed information - Researching the Internet resources for the most
current firewall security surveys and news
10Main Bottlenecks
- Reading through the literature to find the
relevant sources to the assigned topic - Searching the internet sites trying to eliminate
the irrelevant information as well as outdated
sources - Trying to put all of the information into one
coherent idea and present it in an articulate
format
11Proposed Outline
- Executive Summary
- Introduction
- Abstract
- Terminology
- Objective of the survey
- Scope of the project
- Background and central points
- Researched literature and collected resources
12Proposed Outline (cont)
- Conclusion
- the results of the survey
- Recommendations
- directions to pursue further information
- References
- web sites, journal articles, literature
13Proposed Outline (cont)
- Appendix
- quick overview of the survey and our own
afterthoughts about what we have accomplished
14Our Progress So Far...
- We have made a fairly successful progress with
our research on various topics concerning the
firewall security - We are confident that our project is going in the
right direction and that our paper will be a
success