B.Sc. Thesis Presentation
Title: Load Balancing Ip Table
By:
Lena Hassan
Nusaiba Abu obaida
Salma salah
Co.Supervisors:
Dr. Muhammad babiker
Dr. Fahmi Al- sadig
contents
Introduction
Problem
Objectives
Related works
Methodology
Reference
Agenda Style
Introduction
• Concept of security
• Concept of firewall as one of network technologies that
used to protect information transmit through internet .
• . Concept of high availability and its important role in
providing information.
Introduction
Problem:
firewall failures have become a common
occurrence facing organizations that use the
Internet and use firewalls to protect information,
The failure of the wall leads to an interruption of
service and the loss of necessary protection
that the organization needs and fixing the crash
may require a period of time in the meantime,
as there is no alternative to keeping its
information protected. The organization may be
exposed to the act of the hacker resulting in the
loss of important information.
.
Agenda Style
Objectives
• Develop model that solve unavailability of services.
• Ensure that the network is not interrupted, case there are cluster
firewalls if one falls the other ensures continuity of service.
• Enhanced protection, using a strong cluster firewall protect
your network from malicious incoming traffic.
• Test the model.
Objectives
Related works
Recomme
ndations
Results
Methodol
ogy
Problem+ Objecti
ve
Author + y
ear
developments f
ollow the prese
nt trend, contin
ue to combine c
onfigurable acc
ess control and
authentication
mechanisms wit
h their tradition
al functions.
Helping to provi
ding more powe
rful and flexible
protection for n
etworks to mak
e them secure.
Development ne
w features are c
onstantly being
add to firewall.
solve The increasing comple
xity of networks, and the ne
ed to make them more open
due to the growing emphasi
s on and attractiveness of th
e Internet as a medium for b
usiness transactions.
HABTAMU ABI J
ANUARY 2000
1
Includes extend
ing.
Helping to provi
ding more powe
rful and flexible
protection for n
etworks to mak
e them secure.
Use a user-frien
dly tool called “
Firewall Policy
Advisor.”
management of any generic
firewall policy written as filte
ring rules, while minimizing
network vulnerability due to
firewall rule misconfiguratio
n.
EHAB S. AL-SHA
ER and HAZEM H
. HAMED
2004
2
Methodology
Two firewalls inside one cluster links
them together. One is configured as
the master device; the other one is
configured as the backup device and
these firewalls communicate through a
heartbeat to make sure that the master
device is working. If this
communication between the two
firewalls is soaked, the pulses are cut
off, and the firewall in the reserve
sends messages to the master device.
If it does not get a response from it, the
backup device automatically works to
maintain the availability of network
communication.
Agenda Style
Reference
Reference
[1] K. Ingham, “A History and Survey of Network Firewalls,” vol. V, pp. 1–42.
[2] K. Scarfone and P. Hoffman, Guidelines on firewalls and firewall policy: recommendations of the National Instit
ute of Standards and Technology, vol. 1. 2015.
[3] E. Etuk, “CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN,” no. April, 2016.
[4] J. Partnerawx, G. Rodriguez, T. Kaur, V. Malhotra, and D. Singh, “Comparison of network security tools-Firewal
l , Intrusion Detection System and Honeypot Comparison of network security tools- Firewall , Intrusion Detection
System and Honeypot”.
[5] Proceedings of International Conference on Technology Management (ICTM 2016), no. Ictm. 2016.
[6] R. Mart, “THE HIGH AVAILABILITY OF STATEFUL FIREWALLS ADVISED BY”.
[7] M. V Pawar and J. Anuradha, “Network Security and Types of Attacks in Network,” Procedia - Procedia Comput
. Sci., vol. 48, no. Iccc, pp. 503–506, 2015, doi: 10.1016/j.procs.2015.04.126.
[8] L. Yuan and H. Chen, “FIREMAN : A Toolkit for Firewall Modeling and ANalysis,” 2006.
[9] H. Abie, “An overview of firewall technologies An Overview of Firewall Technologies”.
[10] H. Hu, S. Member, G. Ahn, and S. Member, “Detecting and Resolving Firewall Policy Anomalies”.
[11] E. Al- shaer, E. S. Al- shaer, and H. H. Hamed, “Modeling and Management of Firewall Policies Modeling and
Management of Firewall Policies”.
[12] A. S. Muntaka, “An Enhanced Integrated High Availability Cluster Model Based on Active- Active and Active-P
assive Cluster,” no. November 2018, 2020, doi: 10.13140/RG.2.2.17449.75360.
[13] B. Author, F. Wennerhult, M. Bj, and H. Bjurgren, “Evaluating high availability in the enterprise network,” 2015
[14] R. D. Oliveira, D. G. Mesquita, and P. F. Rosa, “HARP: A split brain free protocol for high availability implemen
ted in FPGA,” Adv. Int. Conf. Telecommun. AICT, vol. 2013-Janua, no. January, pp. 197–203, 2013.
[15] Y. Feng, N. Huang, S. Member, and Y. Wu, “Evaluation of TCP State Replication Methods for High-Availability
Firewall Clusters,” no. Ii, pp. 2–7, 2008.
[16] J. Ng, P. Soon, S. Hassan, and R. Abdulla, “Implementing of Virtual Router Redundancy Protocol in a Private
University,” vol. 1, no. 4, pp. 255–259, 2013, doi: 10.12720/jiii.1.4.255-259.
[17] P. Rajamohan, “An Overview of Virtual Router Redundancy Protocol Techniques and Implementation for Ente
rprise Networks,” vol. 1, no. 9, pp. 554–562, 2014.
[18] A. I. Aparicio, “A High Availability platform design using Heartbeat and integration in a production environme
nt,” 2008.
Thank you

press.pptx

  • 1.
    B.Sc. Thesis Presentation Title:Load Balancing Ip Table By: Lena Hassan Nusaiba Abu obaida Salma salah Co.Supervisors: Dr. Muhammad babiker Dr. Fahmi Al- sadig
  • 2.
  • 3.
    Agenda Style Introduction • Conceptof security • Concept of firewall as one of network technologies that used to protect information transmit through internet . • . Concept of high availability and its important role in providing information. Introduction
  • 4.
    Problem: firewall failures havebecome a common occurrence facing organizations that use the Internet and use firewalls to protect information, The failure of the wall leads to an interruption of service and the loss of necessary protection that the organization needs and fixing the crash may require a period of time in the meantime, as there is no alternative to keeping its information protected. The organization may be exposed to the act of the hacker resulting in the loss of important information. .
  • 5.
    Agenda Style Objectives • Developmodel that solve unavailability of services. • Ensure that the network is not interrupted, case there are cluster firewalls if one falls the other ensures continuity of service. • Enhanced protection, using a strong cluster firewall protect your network from malicious incoming traffic. • Test the model. Objectives
  • 6.
    Related works Recomme ndations Results Methodol ogy Problem+ Objecti ve Author+ y ear developments f ollow the prese nt trend, contin ue to combine c onfigurable acc ess control and authentication mechanisms wit h their tradition al functions. Helping to provi ding more powe rful and flexible protection for n etworks to mak e them secure. Development ne w features are c onstantly being add to firewall. solve The increasing comple xity of networks, and the ne ed to make them more open due to the growing emphasi s on and attractiveness of th e Internet as a medium for b usiness transactions. HABTAMU ABI J ANUARY 2000 1 Includes extend ing. Helping to provi ding more powe rful and flexible protection for n etworks to mak e them secure. Use a user-frien dly tool called “ Firewall Policy Advisor.” management of any generic firewall policy written as filte ring rules, while minimizing network vulnerability due to firewall rule misconfiguratio n. EHAB S. AL-SHA ER and HAZEM H . HAMED 2004 2
  • 7.
    Methodology Two firewalls insideone cluster links them together. One is configured as the master device; the other one is configured as the backup device and these firewalls communicate through a heartbeat to make sure that the master device is working. If this communication between the two firewalls is soaked, the pulses are cut off, and the firewall in the reserve sends messages to the master device. If it does not get a response from it, the backup device automatically works to maintain the availability of network communication.
  • 8.
    Agenda Style Reference Reference [1] K.Ingham, “A History and Survey of Network Firewalls,” vol. V, pp. 1–42. [2] K. Scarfone and P. Hoffman, Guidelines on firewalls and firewall policy: recommendations of the National Instit ute of Standards and Technology, vol. 1. 2015. [3] E. Etuk, “CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN,” no. April, 2016. [4] J. Partnerawx, G. Rodriguez, T. Kaur, V. Malhotra, and D. Singh, “Comparison of network security tools-Firewal l , Intrusion Detection System and Honeypot Comparison of network security tools- Firewall , Intrusion Detection System and Honeypot”. [5] Proceedings of International Conference on Technology Management (ICTM 2016), no. Ictm. 2016. [6] R. Mart, “THE HIGH AVAILABILITY OF STATEFUL FIREWALLS ADVISED BY”. [7] M. V Pawar and J. Anuradha, “Network Security and Types of Attacks in Network,” Procedia - Procedia Comput . Sci., vol. 48, no. Iccc, pp. 503–506, 2015, doi: 10.1016/j.procs.2015.04.126. [8] L. Yuan and H. Chen, “FIREMAN : A Toolkit for Firewall Modeling and ANalysis,” 2006. [9] H. Abie, “An overview of firewall technologies An Overview of Firewall Technologies”. [10] H. Hu, S. Member, G. Ahn, and S. Member, “Detecting and Resolving Firewall Policy Anomalies”. [11] E. Al- shaer, E. S. Al- shaer, and H. H. Hamed, “Modeling and Management of Firewall Policies Modeling and Management of Firewall Policies”. [12] A. S. Muntaka, “An Enhanced Integrated High Availability Cluster Model Based on Active- Active and Active-P assive Cluster,” no. November 2018, 2020, doi: 10.13140/RG.2.2.17449.75360. [13] B. Author, F. Wennerhult, M. Bj, and H. Bjurgren, “Evaluating high availability in the enterprise network,” 2015 [14] R. D. Oliveira, D. G. Mesquita, and P. F. Rosa, “HARP: A split brain free protocol for high availability implemen ted in FPGA,” Adv. Int. Conf. Telecommun. AICT, vol. 2013-Janua, no. January, pp. 197–203, 2013. [15] Y. Feng, N. Huang, S. Member, and Y. Wu, “Evaluation of TCP State Replication Methods for High-Availability Firewall Clusters,” no. Ii, pp. 2–7, 2008. [16] J. Ng, P. Soon, S. Hassan, and R. Abdulla, “Implementing of Virtual Router Redundancy Protocol in a Private University,” vol. 1, no. 4, pp. 255–259, 2013, doi: 10.12720/jiii.1.4.255-259. [17] P. Rajamohan, “An Overview of Virtual Router Redundancy Protocol Techniques and Implementation for Ente rprise Networks,” vol. 1, no. 9, pp. 554–562, 2014. [18] A. I. Aparicio, “A High Availability platform design using Heartbeat and integration in a production environme nt,” 2008.
  • 9.