STRENGTHENING WEB-BASED BUSINESS SECURITY: AN INTEGRATED APPROACH USING FIREWALLS, IDS/IPS, AND VULNERABILITY SCANNERS
Cuvinte cheie:
Network Security, Firewalls, IDS/IPS , Vulnerability Scanners, Web-Based BusinessesRezumat
With the increasing frequency and sophistication of cyberattacks, web-based businesses require a cohesive and practical security architecture to safeguard critical systems and data. This paper examines the integration of firewalls (pfSense, Cisco ASA), intrusion detection and prevention systems (Snort, Suricata), and vulnerability scanners (OpenVAS) as core components of a defense-in-depth strategy. Firewalls serve as the first line of defense by controlling network access, while IDS/IPS tools provide real-time monitoring and response to threats such as malware and brute force attempts. Vulnerability scanners identify system weaknesses that may otherwise go unnoticed. We explore integration techniques, including centralized monitoring, configuration alignment, and architectural compatibility, along with deployment challenges such as complexity and false alarms. Through case studies in e-commerce and other online services, we demonstrate how combining these tools can enhance security posture, support regulatory compliance (e.g., GDPR, HIPAA), and improve operational resilience without incurring excessive costs.
Referințe
Ayers, R., et al. (2020). Defense in depth: Strategies for a layered cybersecurity approach. U.S. Department of Homeland Security. https://www.cisa.gov/sites/default/files/publications/Defense_in_Depth_Strategies_2020.pdf
Cisco. (2023). Cisco ASA with Firepower services: Technical overview and configuration guide. Cisco Systems. https://www.cisco.com
FreeBSD Foundation. (2022). pfSense security platform: Architecture and features. Netgate. https://www.pfsense.org
Roesch, M., & Cisco Talos Intelligence Group. (2023). Snort: Open-source network intrusion prevention & detection system. https://www.snort.org
Paxson, V. (2019). Zeek network security monitor (formerly Bro): User documentation and use cases. https://zeek.org
Open Information Security Foundation (OISF). (2024). Suricata IDS/IPS/NSM overview and configuration. https://suricata.io
Greenbone Networks. (2023). OpenVAS: Open vulnerability assessment system documentation. https://www.greenbone.net
OISF (Open Information Security Foundation). (2024). Suricata IDS/IPS/NSM Overview and Configuration. https://suricata.io/
National Institute of Standards and Technology (NIST). (2018). Framework for improving critical infrastructure cybersecurity (Version 1.1). U.S. Department of Commerce. https://www.nist.gov/cyberframework
International Organization for Standardization. (2013). ISO/IEC 27001: Information security management systems — Requirements. https://www.iso.org/standard/54534.html
European Union Agency for Cybersecurity (ENISA). (2023). Threat landscape report 2023: Web application security trends. https://www.enisa.europa.eu
OWASP Foundation. (2023). OWASP top ten web application security risks. https://owasp.org
National Institute of Standards and Technology. (2020). Security and Privacy Controls for Information Systems and Organizations (NIST SP 800-53 Rev. 5). https://doi.org/10.6028/NIST.SP.800-53r5
MITRE Corporation. (2023). MITRE ATT&CK Framework. https://attack.mitre.org/
SANS Institute. (2022). Security Information and Event Management (SIEM) Best Practices. https://www.sans.org/
Gartner. (2021). Market Guide for Security Orchestration, Automation and Response Solutions.
Descărcări
Publicat
Cum cităm
Număr
Secțiune
Licență
Open access and copyright policy
The journal offers access to the contents in the open access system on the principles of non-exclusive license Creative Commons (CC BY 4.0). Thus, the authors are required to agree with that policy. In this regard, authors will be asked to complete a submission card with a copyright transfer agreement that specifies detailed descriptions of the copyright transfer. The submission card is provided via email before the publication.
Publication fee
IJSSASS is a self-funded journal. For this reason, the journal handles a publication fee. The current publication fee is provided on the journal’s Web site in the section Instruction for authors. Thus, the publication fee that is required for manuscript processing is clearly stated on our website




