2Guideline -What’s a Firewall? -Problems of Firewall -Objectives and Scope-Relevant Knowledges and Researches-What’s iWall?-iWall’s Architecture and Speciality-Schedule
3What’s a Firewall? -The term “Firewall” is derived from metal sheets which are designedto confine fire in a specific area.-Computer “Firewall”regulates computer trafficbetween different securitydomains.
4Types of Firewall -Packet Filtering -Application Gateway -Stateful Inspection
6Types of Attack -Password Attacks -Denial of Service -Trojan Horse & Virus-Man in the Middle-Packet Sniffing-IP Spoofing
7Problems of Firewall-Depends solely on manufacturers’ attack signature database.-Insufficient to fendoff unknown attack patterns.
8Objectives -Create a firewall which can prevent new attack patterns. -Create a firewall which is adaptive to working environment.-To ensure computer network security.
9Scope-To create firewall rules automatically according to attack types and usages.-To keep logs for further uses in optimization by data mining.-Use layered filter to increase the efficiency of iWall in intrusion prevention issues.
28Filter Node -Simulates actual environment. -Designed to lure an attack.-Order of execution sorted by performance and probability of malware detection.
29iWall’s Speciality -Adaptability -Analyze, Learn and Protect -Layered Filters
30Adaptability -Adaptive to traffic congestion -Adaptive to malware detection rate-Flexible to working environments“It is not the strongest of the species that survives,nor the most intelligent.It is the one that is the most adaptable to change.”- Charles Darwin
31Analyze, Learn and Protect -Log analysis is an iterative process in order to create efficient rules.
32Schedule -Problem analysis -Requirement analysis -Design -Construction -Validation and verification-Documentation and delivery