A brief introduction to the implementation technology of Windows software firewall

Source: Internet
Author: User
Tags filter port number firewall

From the birth of Windows software firewall, this kind of security protection products are following the continuous deepening of hacker and anti-black anti-drug fight, evolving and upgrading. From the earliest analysis only source address, port number and the original message of the packet filtering firewall, and then there are different applications can set different access to network permissions technology; In recent years by ZoneAlarm and other foreign well-known brands led, Also began to popular with unknown attack interception capability of intelligent behavior Monitoring firewall; Finally, due to the recent prevalence of spam plug-ins and rogue software, many firewalls are considering the ability to block their own rogue software. In summary, Windows software firewall from the beginning of a simple packet packet loss, interception of IP and port tools, developed into today's powerful overall security suite.

Next, this article gives a brief technical introduction to these components that a Windows software firewall should have.

Packet Filtration Technology

Packet-filtering technology is the first feature owned by the most primitive firewalls. But the feature is simple and powerful, and until now it is an essential feature of any firewall.

To intercept a network packet before it reaches the application, install a filter hook on the system's network protocol stack. For the Windows NT family kernel, it is possible to install a filter hook that is roughly the number of places from top to bottom: SPI layer (early Skynet firewall), AfD layer (lack of data, no examples), TDI layer (many domestic walls), NDIS layer (ZoneAlarm, Outpost, etc.). The more at the top, the lower the difficulty of product development, but the weaker the function, the easier it is to be traversed by attackers. Because the NDIS firewall has powerful, not easy to penetrate and other advantages, the recent trend of the major firewall manufacturers are to choose the NDIS layer to do packet filtering.

At present, there are two kinds of NDIS hook technology which are more popular. One is to hook up the Ndis.sys module's export function, thereby replacing its send (packets) handler and receive (packet) handler by intercepting the registration process for each NDIS protocol registration. The disadvantage of this method is that it cannot take effect immediately after the first security, it must be repeated, and must be reset if it is to be disabled.



Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.