Study of methods for endpoint aware inspection in a next generation firewall

dc.contributor.authorHeino Jenny
dc.contributor.authorHakkala Antti
dc.contributor.authorVirtanen Seppo
dc.contributor.organizationfi=kyberturvallisuusteknologia|en=Cyber Security Engineering|
dc.contributor.organizationfi=tietotekniikan laitos|en=Department of Computing|
dc.contributor.organization-code1.2.246.10.2458963.20.28753843706
dc.contributor.organization-code1.2.246.10.2458963.20.85312822902
dc.converis.publication-id176187266
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/176187266
dc.date.accessioned2025-08-27T23:43:33Z
dc.date.available2025-08-27T23:43:33Z
dc.description.abstract<p>Given the global increase in remote work with the COVID-19 pandemic and deperimeterization due to cloud deployment of next generation firewalls, the concept of a next generation firewall is at a breaking point. It is becoming more difficult to define the barrier between the good and the bad. To provide the best security for an endpoint with minimal false positives or false negatives it is often necessary to identify the communicating endpoint application. In this study, we present an analysis of key research and methods for providing endpoint aware protection in the context of a next generation firewall. We examine both academic research as well as state-of-the-art of the existing next generation firewall implementations. We divide endpoint application identification into passive and active methods. For passive endpoint application identification, we study several traffic fingerprinting methods for different protocols. For active methods we consider active scanning, endpoint metadata analysis and content injection and reference existing implementations. We conclude that there are several open areas for future research, and that none of the considered methods is a silver bullet solution for endpoint aware inspection in the context of a next generation firewall. To our best knowledge, this is the first study to examine current research and existing implementations of endpoint aware inspection.<br></p>
dc.format.pagerange1
dc.format.pagerange15
dc.identifier.eissn2523-3246
dc.identifier.jour-issn2523-3246
dc.identifier.olddbid204497
dc.identifier.oldhandle10024/187524
dc.identifier.urihttps://www.utupub.fi/handle/11111/53025
dc.identifier.urlhttps://cybersecurity.springeropen.com/articles/10.1186/s42400-022-00127-8
dc.identifier.urnURN:NBN:fi-fe2022091258765
dc.language.isoen
dc.okm.affiliatedauthorHeino, Jenny
dc.okm.affiliatedauthorHakkala, Antti
dc.okm.affiliatedauthorVirtanen, Seppo
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline213 Electronic, automation and communications engineering, electronicsen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.discipline213 Sähkö-, automaatio- ja tietoliikennetekniikka, elektroniikkafi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA1 ScientificArticle
dc.publisherSpringer
dc.publisher.countrySingaporeen_GB
dc.publisher.countrySingaporefi_FI
dc.publisher.country-codeSG
dc.relation.articlenumber25
dc.relation.doi10.1186/s42400-022-00127-8
dc.relation.ispartofjournalCybersecurity
dc.relation.volume5
dc.source.identifierhttps://www.utupub.fi/handle/10024/187524
dc.titleStudy of methods for endpoint aware inspection in a next generation firewall
dc.year.issued2022

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
s42400-022-00127-8.pdf
Size:
1.17 MB
Format:
Adobe Portable Document Format