Journal of Information Security, 2011, 2, 122-130
doi:10.4236/jis.2011.23012 Published Online July 2011 (http://www.SciRP.org/journal/jis)
Copyright © 2011 SciRes. JIS
Proactive Security Mechanism and
Design for Firewall
Saleem-Ullah Lar1,3, Xiaofeng Liao2, Aqeel ur Rehman1, Qinglu Ma1
1Department of Com p uter Sci e nce , Chongqing University, Chongqing, China
2Faculty of Computer S cience , Senior Member IEEE, Chongqing University, Chongqing, China
3Departme nt of Comp uter Science and IT, T he Isl a mi a U niversi t y Bahawalpur, Pakistan
E-mail: salimbzu@gmail.com
Received June 2, 2011; revised July 5, 2011; accepted July 15, 2011
Abstract
In this paper we have present the architecture and module for internet firewall. The central component is
fuzzy controller while properties of packets are fuzzified as inputs. On the basis of proposed fuzzy security
algorithm, we have figured out security level of each packet and adjust according to packets dynamic states.
Internet firewall can respond to these dynamics and take respective actions accordingly. Therefore, proactive
firewall solves the conflict between speed and security by providing high performance and high security.
Simulation shows that if the response value is in between 0.7 and 1 it belongs to high security.
Keywords: Firewall Security, Security Evaluation, Network Security
1. Introduction
The expansion of the Internet and e-Commerce has made
organizations more vulnerable to electronic threats than
ever before. With the increasing quantity and sophistica-
tion of attacks on IT assets, companies have been suffer-
ing from breach of data, loss of customer confidence and
job productivity degrad ation, all of which even tu ally lead
to the loss of revenue. According to the 2004 CSI/FBI
Computer Crime and Security survey [1], organizations
that acknowledged financial loss due to the attacks (269
of them) reported $141 millio n lost, and this number has
only grown since. Moreover, as unskilled, unmanned
attacks such as worms and viruses multiply the probab il-
ity of attack approaches for every organization. The
question therefore shifts from whether an attack will oc-
cur, to when an attack will occur. Thus, a so und IT secu-
rity plan is more important than ever, and the protection
provided by current and emerging Intrusion Prevention
Systems (IPS) is becoming a critical component [2-5].
IPS utilizes IDS algorithms to monitor and drop or al-
low traffic based on expert analysis. These devices nor-
mally work at different areas in the network and proac-
tively monitor any suspicious activity that could other-
wise bypass the firewall. IPS “firewalls” can intelligently
prevent malicious traffic from entering/exiting the fire-
wall and then alert administrators in real time about any
suspicious activity that may be occu rring on the network
[6]. A complete network IPS solution also has the capa-
bility to enforce traditional static firewall rules and ad-
ministrator-defined whitelists and blacklists.
Though IPS devices are the most resource intensive, they
are still relatively high-performing due to the latest proces-
sors, software, and hardware advancements. IPS may be
distributed and hardware based [7-10]. Today two catego-
ries of IPS exist: Network-based Intrusion Prevention and
Host-based Intrusion Prevention. Network IPS monitors
from a network segment level, and can detect and prevent
both internal and external attacks. Network IPS devices
separate networks in much the same fashion as firewalls.
Host IPS software runs d irectly on workstation s and server s
detects and prevents threats aimed at the local host. In both
cases, attack recognition is usually accomplished via two
primary methods of IDS: known-attack detection, and ano-
malous beha vior det ecti on.
This paper focuses on fuzzy mechanism with the help of
Gaussian mechanism as a member function and center of
gravity procedure which is an implementation of a fuzzy in-
puts and outputs respectively in the model. The rest of the
paper is organized as follows: Section 2 presents the chal-
lenges faced by traditional security architectures. Section 3
describes proposed firewall architecture. Section 4 explains
about proposed pro active fuzzy security mechanism. Finally,
Section 5 presen ts simulati on results an d concludes t he paper.
S.-U. LAR ET AL.
Copyright © 2011 SciRes. JIS
123
2. The Challenges for Traditional Security
Architecture
In fact, it is still the Firewall that plays the key role in
traditional security architecture, since it controls most of
the incoming and outgoing traffic of an enterprise. Es-
sentially the firewall is almost a must-have in each en-
terprise. To review the challenges for the traditional ar-
chitecture, undoubtedly it is necessary to address on the
limitation of traditional firewalls. The inability of current
firewalls may include:
1) Limited ports & performance.
2) Complicated UI configuration and policy manage-
ment.
3) Scalability limitation to correspond to organization
growth.
4) Unreliable network secur ity, due to “Single Point of
Defense.
5) Insufficient capability to effectively manage
emerging internet applications hidden in HTTP traffic.
6) Passive security mechanism to respond network
threats including network worms, Trojans and cyber-
attacks.
Facing the emerging malicious codes, network worms
and hybrid attacks today, tradition al firewall is no longer
effectively to harden your enterprise network. Traditional
firewalls usually inspect the incoming traffic cautiously,
and it can base on the network policies to permit, deny or
drop the traffic depending on the traffic trusty or illegal.
But for the outgoing traffic, unfortunately the HTTP traf-
fic is always permitted in the enterprise network, and the
firewalls are lack of the management capability to in-
spect the evolving internet applications which now can
hide themselves in the HTTP traffic and sneak out. Thus,
the enterprises gate seems secure but in fact, the security
cracks have been created.
3. Proposed Firewall Architecture
A true firewall is the hardware and software that inter-
cepts the data between the Internet and your computer.
All data traffic must pass through it, and the firewall al-
lows only authorized data to pass into the corporate net-
work. Firewalls are typically implemented using one of
four primary architectures.
Packet Filters
Circuit-level Gateways
Application Proxies
Network Address Translation
3.1. Definition
Our definition covers the state of firewall technolog y as a
distributed security architecture placed on the data trans-
mission path between communication endpoints. Our
definition of firewall technology states that communica-
tion traffic needs to enter or leave a network security
domain to be of interest to firewall technology. Figure 1
illustrates the possible combinations for point-to-point
communication. For any traffic between sender ai and
receiver bi the definition includes traffic that traverses
the protected domain ({,}, 1)
Aii A
Dab Diand traffic
that traverses networks that are not part of DA with aiεDA
and bi DA (outbound traffic; i = 2), ai 2= DA and bi 2 DA
(inbound traffic i = 3), or both ai 2 DA and bi 2 DB (vir-
tual private networking between DA and DB; i = 4).
Communication traffic between ai and bi that neither
enters nor leaves a network policy domain is not subject
to firewall technology.
Sender {1,2,3,4}
Receiver
i
i
ai
b



{,}, 1
iAii A
aDabD i

Fuzzy agent is the basic element in this architecture
specific attack or a particular phase of an attack. It con-
sists of three components; fuzzy Context, exponential
moving average module and fuzzy inference engine
shown in Figure 2. Fuzzy context represents the problem
domain i.e. normal profile of network in reference to
particular intrusion. Ex ponential moving average module
adapts the fuzzy context according to current network
conditions and traffic patterns, while fuzzy inference
engine actually classifies an event using fuzzy know-
ledge base and real-time inputs. Fuzzy context is a key
component of the fuzzy agent, which consists of rules
and membership functions. Context generation and evo-
lution module constructs optimized rules and member-
ship functions for current network. Fuzzy rules can be
expressed in terms of simple if-then statements with
higher interpretability score. Let the fuzzy sets for fuzzy
input variables are low, medium and high. The member-
ship functions of each linguistic fuzzy set in terms of
boundary parameters are describe by Equations (1)-(2).
The boundary parameters are functions of evolved para-
meters as defined in Equation (5) and moving average
Figure 1. Communication traffic governed by firewall tech-
nology between senders and receivers.
S.-U. LAR ET AL.
Copyright © 2011 SciRes. JIS
124
Figure 2. Architecture of a fuzzy typical approach.
modules output. Member-ship functions contract or ex-
pand linearly according to network history depending
upon exponential moving average modules output. This
helps in adjusting the attack threshold value at that par-
ticular interval while evolved parameters set the normal
and not-normal class boundaries.
Fuzzy inference engine that is third component of
fuzzy agent, classifies the real-time input as normal or
malicious using fuzzy knowledge base. It basically ac-
complishes three functions (fuzzification, fuzzy infe-
rence, defuzzification) based on Mumdani principle [11].
In fuzzification, a crisp input i.e. a record from feature
set is mapped to fuzzy sets to determine the membership
degree. The inference engine evaluates applicable rules
and their degree of matching to generate consequent
rules. The defuzzification function aggregates the con-
sequent rules and using centroid method, generates one
crisp output, which determines the class of input record
[11].
3.2. Controller
Proposed mechanism is employed in the controller which
is the core module this firewall. The controller has the
functionality to integrate with th e arrival packets (inputs)
applied rules, and fuzzy logic to measure the security
level of arriving packets. Using these values controller
has to do following main tasks to process the connections
accordingly.
1) Filtration
2) Dynamic Monitoring
3.3. Dynamic Packet Filtering
Dynamic packet filtering is a firewall and routing capa-
bility that provides network packet filtering based not
only on packet information in the current packet, but also
on previous packets that have been sent. For example
without dynamic packet filtering, a connection response
may be allowed to go from the internet to the secu re part
of the netwo rk. Dynamic packet filtering would con sider
whether a connection was started from inside the secure
part of the network and only allow a connection response
from the internet if the packet appeared to be a response
to the request.
Dynamic packet filtering filters packets based on:
1) Administrator defined rules governing allowed ports
and IP addresses at the network and transport layers of
the OSI network model.
2) Connection state which considers prior packets that
have gone through the firewall.
3) Packet contents including the application layer
contents
Static packet filtering only filters packets based on
administrator defined rules governing allowed ports and
IP addresses at the network and transport layers of the
OSI network model as mentioned in item 1 above.
Therefore dynamic packet filtering also called state-full
inspection which provides additional capabilities includ-
ing inspection of packet contents up to the application
layer and consideration of the state of any connections.
Dynamic packet filtering provides a better level of se-
curity than static packet filtering since it takes a closer
look at the conten ts of the packet and also considers pre-
vious connection states.
3.4. Network Address Translation
NAT is a very important aspect of firewall security. It
conserves the number of public addresses used within an
organization, and it allows for stricter control of access
to resources on both sides of the firewall. Most modern
firewalls are state full—that is, they are able to set up the
connection between the internal workstation and the In-
ternet resource. They can keep track of the details of the
connection, like ports, packet order, and the IP addresses
involved. This is called keeping track of the state of the
connection. In this way, they are able to k eep track of the
session composed of communication between the
workstation and the firewall, and the firewall with the
Internet. When the session ends, the firewall discards all
of the information about the connection. It is suggested
S.-U. LAR ET AL.
Copyright © 2011 SciRes. JIS
125
to design network using RFC-1918 [12] that never ad-
vertised outside from the intranet. The mapping is dy-
namic so it is difficult to guess either two connections
with the same IP actually come from the same or differ-
ent hosts.
3.5. Security Rules and Policies
Allowing or denying services or connections between
networks defined by security policies and rules.
4. Proactive Fuzzy Security Mechanism
Saniee Abadeh [13] presents combined fuzzy logic and
genetic algorithm to evolve fuzzy rules, optimize mem-
bership functions to detect new anomalies. While our
proposed proactive firewall security mechanism which is
employed in the fuzzy controller is different and ex-
plained as follows.
4.1. Proactive Control
Since the state of packets in the networks is constantly
varying, its security level is also changeable. Previous
secure user may initiate malicious attack or disobey the
security rules. So the fields of “attack times” are used to
record the times of disobeying security rules. Accor-
dingly, the source or destination security values will be
adjusted to respond to its varying security state. When
the source and destination security vary from 1 to 0, the
overall security level of the connection smoothly vary
accordingly. Therefore, the output can reflect the chan-
ges of packets status. Different methods and security
policies are used for 1148 different kinds of connections
and policies of control over them are adjusted according
to their varying states. So, the firewall is fuzzily adap tive
and proactive.
4.2. Source Generation
Figure 3 describe Input generation based on source and
destination security values employed in fuzzy controller.
Range of input is [0, 1] and value is directly proportional
to security level. We have defined Gaussian member
function for the source security, which is represented as


2
2
2
,, e01
sc
Ssc S

 (1)
Sl
, Sm
and h
denoted as Low, Medium, and High
security levels for the source member function respec-
tively depending on parameters
and c.


2
2
2
,, e01
Dc
DDc D

 (2)
D
l
,
D
m
and
D
h
denoted as Low, Medium, and
High security levels for the destination member function
respectively.
4.3. Applied Rules and Regulations
For our system we have defined the rules as shown in the
Figure 3, while fuzzy applied relations for the applied
rules are as follows.
Rule 1 IF source = low and destination = low
THEN security = low
Rule 2 IF source = low and destination = medium
THEN security = low
Rule n IF source = high or destination = high
THEN security = high
Mathematically we can define applied relations as,
For Rule 1: 1111
R
SDZ
μμμ
For Rule n:
R
nSnDnZn
μμμ
So we can write that,
12
R
RR Rn
μμ μ
μ
(3)
Therefore,
Z
SDR
 (4)
and
SDR
μzμμ
μ
(5)
We defined above rules just to cope up with the issue
of input space up to maximum possible effort. Since
process mostly requires non-fuzzy values, so defuzzifi-
cation process is necessary to implement this is described
in next section. For low priority based trusted packets
both application level and dynamic packet monitor are
used providing high security, while filtration takes place
for highly trusted packets. It is fuzzily adaptive and
proactive in a sense that its characteristics and packet
status are fuzzified and its output reflects the packet dy-
namic status (Figure 4).
4.4. Destination Generation
We have defined member function for destination output
which is obtained from Equation (5 ) as,


0
d
d
z
z
zzz
Zzz
The above equation used is based on center of gravity
method.
Figure 5 shows the characteristics and security level
designed for output generation based on the rules and
relations desc ribed earlier.
S.-U. LAR ET AL.
Copyright © 2011 SciRes. JIS
126
Figure 3. Input members function ge ne r a tion.
Figure 4. Defining fuzzy rules.
5. Simulation and Analysis
This section describes the experimental results and per-
formance evaluation of the proposed system. The pro-
posed system is implemented in MATLAB (7.0.1).
Based on above defined procedure our simulation results
described in the following figures. Figure 6 descr ibes the
value generated by source and destination with its secu-
rity level based on the defined rules. We can see that
values on both sides are almost directly proportional
which reflects the level of the security
The fuzzy rules given to the fuzzy system is done
S.-U. LAR ET AL.
Copyright © 2011 SciRes. JIS
127
Figure 5. Members function for destination output security.
Figure 6. Visualization of Source and destination with security level (rule observer).
manually by analyzing intrusion behavior. Some time it
is very difficult to generate fuzzy rules manually due to
the fact that the input data is huge and also having more
attributes. But, a few of researches are available in the
literature for automatically identifying of fuzzy rules in
recent times. Motivated by this fact, we make use of
mining methods to identify a better set of rules.
Table 1 and Figure 7 shows the clear view about the
security level for each connection.
Various control method used to monitor and control the
connection according to its security level. Therefore
firewall is proactive, intelligent and remains secure and
provide high perf ormance.
A smoothly varying surface can provide the value of
S.-U. LAR ET AL.
Copyright © 2011 SciRes. JIS
128
overall security level for each connection. It has been
observe deeply through ramp function that input and
output security varies from 0 to 1 and the overall security
level also varies smoothly, and we can get the status of
the packets from the output generation. The ramp func-
tion is an elementary unary real function, easily comput-
able as the mean of its independent variable and its ab-
solute value and it is derived by the look of the graph.
From Figures 8 and 9 we can see that as source gen-
erated value increases or decreases it has clear effect on
the security level and a particular action will be taken
place based on the results.
6. Conclusions
In this work, fuzzy based system was designed to eva-
luate the threat level of identified threats, because it is
impossible to provide assurance for the system and jus-
tify security measures incorporated unless the system is
analyzed during the designing state of computer based
systems. With this system designed, risk analysis has
been made easier to perform.
Figure 7. Surface level view (final result).
Figure 8. Rule and surface viewer (high security).
S.-U. LAR ET AL.
Copyright © 2011 SciRes. JIS
129
Figure 9. Rule and surface viewer (low security).
Table 1. Security level for each connection.
Output Value -μ(z) Security Level Action Taken for
Connection
>0 and <0.2 Insecure Denied
>0.2 and <0.4 Low Security Dynamic Monitoring and
Auditing
>0.4 and <0.7 Medium Security Dynamic Monitoring and
Filtering
>0.7 and <1 High Security Only Filter
Overall security level and methods to control packets
and connections can be adjusted as per network dynamic
status. It resolves the issues between security and speed
providing high security and high performance. It is fuz-
zily adaptive and intelligent and has flexibility with a
high degree of perfo rmance.
7. Future Work
For further research, this system designed can be rede-
signed using object orientated programming language
and other models like DREAD and SWOT model can be
used.
8. References
[1] CSI/FBI, “Computer Crime and Security Survey,” 2004.
http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdf
[2] C. Baumrucker, J. Burton, S. Dentler, et al., “Cisco Secu-
rity Professional’s Guide to Secure Intrusion Detection
Systems,” Syngress Publishing, Burlington, 2003.
[3] C. Endorf, E. Schultz and J. Mellander, “Intrusion Detec-
tion & Prevention,” McGraw-Hill, Boston, 2004.
[4] “Technical Overview of The Bouncer,”
http://www.cobrador.net/docs/whitepaper.pdf
[5] M. Barkett, “Intrusion Prevention Systems,” NFR Secu-
rity, Inc., 2004.
http://www.nfr.com/resource/downloads/SentivistIPS-W
P.pdf
[6] K. Xinidis, K. G. Anagnostakis and E. P. Markatos, “De-
sign and Implementation of a High Performance Network
Intrusion Prevention System,” Proceedings of the 20th
International Information Security Conference (SEC
2005), Makuhari-Messe, Chiba, 30 May-1 June 2005.
[7] T. Sproul and J. Lockwood, “Wide-Area Hardware-Ac-
celerated Intrusion Prevention Systems (WHIPS),” Pro-
ceedings of the International Working Conference on Ac-
tive Networking (IWAN), Lawrence, 27-29 October 2004.
[8] D. Sarang, K. Praveen, T. S. Sproull and J. W. Lockwood,
“Deep Packet Inspection Using Parallel Bloom Filters,”
IEEE Micro, Vol. 24, No. 1, 2004., pp. 52-61.
[9] D. V. Schuehler, J. Moscola and J. W. Lockwood, “Ar-
chitecture for a Hardware-Based, TCP/IP Content-Proc-
essing System”, IEEE Micro, Vol. 24, No. 1, 2004, pp.
62-69.
[10] H. Song and J. W. Lockwood, “Efficient Packet Classifi-
cation for Network Intrusion Detection Using FPGA,”
Proceedings of the International Symposium on Field-
Programmable Gate Arrays (FPGA’05), Monterey, 20-22
February 2005.
[11] J. Yen and R. Langari, “Fuzzy Logic: Intelligence, Con-
trol and Information,” Prentice Hall, Upper Saddle River,
1999.
S.-U. LAR ET AL.
Copyright © 2011 SciRes. JIS
130
[12] http://tools.ietf.org/html/rfc1918
[13] M. S. Abadeh, J. Habibi and C. Lucas, “Intrusion Detec-
tion Using a Fuzzy Genetics-Based Learning Algorithm,”
Journal of Network and Computer Applications, Vol. 30,
No. 2007, 2007, pp. 414-428.