Abstract

This study aims to create a network security system that can mitigate attacks carried out by internal users and reduce attacks from internal networks. Further, a network security system is expected to overcome the difficulty of mitigating attacks carried out by internal users. The goal of this research is to analyze the effectiveness of the Next-Generation Firewall implemented to improve network security. The method used in this research is the comparison method with a test of TCP SYN attack, UDP flood attack, ICMP smurf attack, and DHCP starvation attack on a company network. From the experiment results, it can be concluded that the Next-Generation Firewall has significantly better performance for protecting mitigating attacks carried out by internal users on a company network. It can increase the security of data communication networks against threats from the internal networks.

Highlights

  • IntroductionIt is crucial to secure network infrastructure [1]

  • Advances in Information and Technology (IT) technology today bring security concerns

  • The proposed solution demonstrated that the NextGeneration firewall pfSense can prevent attacks from internal users and can reduce attacks from internal networks based on the test scenarios that have been done

Read more

Summary

Introduction

It is crucial to secure network infrastructure [1]. Some widely used mechanisms to secure the network are firewall, Intrusion Detection System (IDS), and Intrusion Prevention System (IPS). A firewall is a software or hardware-based network security system that controls incoming and outgoing network traffic by analyzing packets and determining whether packets are allowed through the firewall or not based on the rules created. Other mechanisms to secure the network are Intrusion Detection System (IDS), which can detect unauthorized attack activity, and Intrusion Prevention System (IPS), which can perform actions to prevent intrusion or attack on the network [3]. The purpose of using Firewall, IPS, or IDS is to protect the internal network from external attacks network and to protect firewall core network from internal attacks

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call