<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Biannual Journal Monadi for Cyberspace Security (AFTA)</title>
<title_fa>امنیت فضای تولید و تبادل اطلاعات (منادی)</title_fa>
<short_title>منادی</short_title>
<subject>Engineering &amp; Technology</subject>
<web_url>http://monadi.isc.org.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2476-3047</journal_id_issn>
<journal_id_issn_online>2476-3047</journal_id_issn_online>
<journal_id_pii>8</journal_id_pii>
<journal_id_doi>7</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>14</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science>13</journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1404</year>
	<month>12</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2026</year>
	<month>3</month>
	<day>1</day>
</pubdate>
<volume>14</volume>
<number>2</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>تکامل دیواره آتش نسل جدید: اعمال سیاست توزیع شده در نقاط پایانی (یک رویکرد عملی برای ایجاد پیرامون های نرم افزار-محور (SDP))</title_fa>
	<title>The Evolution of Next-Generation Firewalls: Distributed Policy Enforcement at the Endpoints (A Practical Approach to Building Software-Defined Perimeters (SDP))</title>
	<subject_fa>رمز و امنیت اطلاعات</subject_fa>
	<subject>Cryptology and Information Security</subject>
	<content_type_fa>کاربردی</content_type_fa>
	<content_type>Applied Article</content_type>
	<abstract_fa>&lt;div style=&quot;text-align: justify;&quot;&gt;حرکت جانبی هسته اصلی حملات باج&#8204;افزاری مدرن است که پس از نفوذ اولیه، به مهاجم اجازه می&#8204;دهد تا در شبکه گسترش یافته و به دارایی&#8204;های حیاتی دسترسی پیدا کند. راهکارهای سنتی بخش&#8204;بندی شبکه مبتنی بر VLAN یا دیواره آتش&#8204;های داخلی، به دلیل پیچیدگی در پیاده&#8204;سازی و مدیریت، اغلب در مهار این تهدید ناکارآمد هستند. این مقاله یک تجربه صنعتی در پیاده سازی رویکردی نوین برای ریزبخش بندی مبتنی بر میزبان را ارائه می&#8204;دهد. در این معماری، با استفاده از یک عامل نرم&#8204;افزاری بر روی هر دارایی، &amp;ldquo;حباب&#8204;های امنیتی&amp;rdquo; مستقلی پیرامون سرویس&#8204;دهنده&#8204;ها و سرویس&#8204;گیرنده&#8204;ها ایجاد می&#8204;شود که ارتباطات مجاز را به صورت دقیق و بر اساس سیاست&#8204;های مرکزی تعریف می&#8204;کنند. این روش، وابستگی به تغییرات پیچیده در زیرساخت شبکه را از بین برده و ابزارهای واکنش سریع، مانند قابلیت انسداد اضطراری، را برای مهار فوری تهدید فراهم می&#8204;آورد. نتایج عملیاتی نشانگر کاهش چشم&#8204;گیر سطح حمله و توانایی بی&#8204;نظیر در توقف آنی حملات باج افزاری در مراحل اولیه است.&lt;/div&gt;</abstract_fa>
	<abstract>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Introduction and Problem Statement&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Next-Generation Firewalls (NGFWs) have long been established as the cornerstone of perimeter security in enterprise networks. By providing centralized control over inbound and outbound traffic, these devices play a vital role in primary defense. However, the modern security paradigm faces a fundamental challenge: once an adversary breaches the perimeter defense, they can often move with relative freedom within the network to access critical assets. This technique, known as lateral movement, is an integral part of advanced persistent threats (APTs) and particularly ransomware attacks, which account for a significant portion of successful breaches.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Traditional network segmentation solutions based on VLANs or Internal Segmentation Firewalls (ISFWs) often fail to contain these threats effectively due to implementation complexity and high management overheads. In response to this limitation, Zero Trust Architecture (ZTA) has emerged as a strategic standard. Its foundational principle, &amp;ldquo;never trust, always verify,&amp;rdquo; requires organizations to shift security from a centralized, perimeter-based model to a distributed, identity-based one. A key pillar for implementing this architecture is the concept of &amp;ldquo;micro-segmentation,&amp;rdquo; where granular security policies are applied directly around each asset or application to minimize the attack surface.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;This paper presents an industrial experience in implementing a novel approach for host-based micro-segmentation. We propose a practical architecture for evolving traditional NGFWs toward a model of distributed policy enforcement at endpoints. By creating software-defined perimeters at the host level, we demonstrate how Zero Trust principles can be effectively implemented. This architecture not only paralyzes the lateral movement of threats but also eliminates dependency on complex network infrastructures by distributing the policy enforcement load, thereby significantly increasing cyber resilience.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Industrial Challenge and Limitations of Traditional Approaches&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;The fundamental challenge in modern network security lies not in the absence of the segmentation concept, but in the exorbitant complexity and cost of its effective implementation. Theoretically, solutions exist for controlling &amp;ldquo;East-West&amp;rdquo; traffic. For instance, organizations can deploy numerous internal firewalls or implement complex Access Control Lists (ACLs) at the switch level to divide their networks into smaller security zones. However, in practice, these approaches face significant hurdles that often lead to the failure of micro-segmentation projects:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;High Infrastructure Costs: Deploying and managing dozens or hundreds of internal firewalls in an enterprise network requires a massive investment in hardware and licensing.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Operational Complexity: Defining, applying, and maintaining thousands of ACL lines or firewall policies for every permitted communication between applications is a management nightmare. This not only makes the process extremely time-consuming but also significantly increases the likelihood of human error and the creation of unintended security holes.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Dependency on Network Topology: Any change in network architecture, such as moving a server or introducing a new service, requires extensive revisions to security policies, disrupting organizational agility.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Consequently, many organizations face a dilemma: settle for broad, inefficient VLAN-based segmentation and accept the risk of lateral movement, or embark on costly, complex micro-segmentation projects with unclear return on investment (ROI). A solution is needed that decouples security control from the physical network infrastructure and enforces it via software directly at the endpoints with minimal management overhead.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Proposed Architecture: Distributed Policy Enforcement&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;To overcome the cost and complexity challenges associated with traditional approaches, we introduce a novel architecture for distributed policy enforcement at endpoints. This solution decouples security control from the physical network infrastructure and transfers it directly to each asset (server or client). This represents an evolution for Next-Generation Firewalls, combining centralized management with a powerful, distributed policy enforcement engine at the host level. The proposed architecture consists of two main components:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;1 - Multi-Functional Software Agent:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;A lightweight software agent is installed on every asset requiring protection. This agent acts as the distributed enforcement point, implementing a set of control capabilities directly at the operating system level:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Authentication and Trust Establishment: Upon installation, the agent initiates verification by sending unique identifiers (MAC Address, IP Address, Host Name) to the central console. Only verified agents are permitted to communicate within the secure environment.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Layer 2-7 Security Policy Enforcement: The agent is responsible for the real-time execution of all defined policies, including identity-based access control, application of custom ARP and DNS tables, and traffic blocking based on advanced rules.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Client-to-Client Traffic Encryption: The capability to encrypt traffic between two verified agents using Pre-Shared Keys (PSK) and standard algorithms like AES-256 guarantees internal communication security at Layer 7. Unlike traditional VPNs, this model operates without encapsulation, avoiding packet fragmentation and resulting in negligible overhead undetectable by clients.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Immediate Isolation Execution: The agent provides &amp;ldquo;Emergency Blocking&amp;rdquo; capabilities, allowing security administrators to instantly isolate suspicious assets from the network with a single click. The agent can execute immediate management commands such as &amp;ldquo;Block Access to Network&amp;rdquo; for complete isolation or &amp;ldquo;PowerOff-System&amp;rdquo; in critical threat scenarios, received directly from the central console.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;2 - Integrated Central Management Console:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;This console acts as the system&amp;rsquo;s brain and single point of management, allowing administrators to define and apply complex security policies through a unified user interface without configuring multiple network devices. Key capabilities include multi-factor identity management (User, Group, IP, MAC, Hostname), granular policy definition (scheduling, service definition, specific logging actions), and management of agent-less devices by defining LAN Areas for unified policy application.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Operational Evaluation and Performance Analysis&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Implementation of this architecture follows a logical, automated process: deployment and verification of agents, definition of multi-factor policies, dynamic synchronization (e.g., every 10 seconds), and distributed execution where each agent independently enforces policies to create a software-defined perimeter around its host.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;To assess the operational impact, the software agent was installed on a standard workstation (Intel Core i5, 8GB RAM), and key performance metrics were measured. The results demonstrate that the agent is a highly &amp;ldquo;lightweight&amp;rdquo; solution with no significant impact on host system performance or network traffic:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;CPU Usage (Idle): ~0.1%&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;CPU Usage (Under Load): &lt; 2%&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Memory Usage (RAM): ~3 MB&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Maximum Added Network Latency: &lt; 1 millisecond&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Central Policy Enforcement Time: &lt; 10 seconds&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;These high-efficiency metrics enable widespread deployment in organizational environments without concerns about performance degradation.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Key Achievements and Conclusion&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Implementing the distributed policy enforcement architecture yields significant operational benefits that directly address modern security challenges:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Paralyzing Lateral Movement: The most critical achievement is curbing attacker lateral movement. Since each asset resides in its own &amp;ldquo;security bubble&amp;rdquo; with default-deny communication, a compromised workstation cannot easily scan the network or access critical servers. Unauthorized communication attempts are blocked and logged at the source, effectively stifling the attack chain.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Significant Attack Surface Reduction: By requiring agent verification and enforcing granular policies, this solution implements a true Zero Trust model. Only essential, pre-defined communications are allowed, reducing the network attack surface from thousands of potentially open ports to a handful of monitored pathways.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Rapid Response and Threat Containment: Capabilities like &amp;ldquo;Emergency Blocking&amp;rdquo; provide incident response teams with powerful tools to instantly contain threats. Administrators can isolate a compromised asset with a single click, preventing ransomware spread or data exfiltration before serious damage occurs.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Simplified Compliance: The architecture simplifies compliance with regulations (like PCI-DSS) by providing software-based micro-segmentation and detailed logging for every policy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;punctuation-wrap:simple&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Infrastructure Independence: Since security policies are attached to the assets themselves rather than network infrastructure (like VLANs or switch ACLs), organizations achieve unprecedented agility. Moving a server from a physical data center to a cloud environment or changing network topology has no impact on the applied security policies.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;In conclusion, this paper presents a practical and efficient architecture for evolving NGFWs toward a distributed policy enforcement model. By deploying intelligent agents at endpoints and centrally managing policies, we demonstrated how software-defined perimeters can be dynamically created. This approach not only effectively neutralizes lateral movement and implements a genuine Zero Trust strategy but also drastically reduces operational complexity by eliminating reliance on network topology. This evolution is a necessary step for securing the modern, hybrid, and borderless digital landscape.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</abstract>
	<keyword_fa>ریزبخش‌بندی, معماری اعتماد صفر, حرکت جانبی, پیرامون نرم‌افزار-محور, دیواره آتش نسل جدید</keyword_fa>
	<keyword>Micro Segmentation, Lateral Movement, Software Defined Perimeter (SDP), Next Generation Firewall (NGFW), Zero Trust Network Access (ZTNA)</keyword>
	<start_page>29</start_page>
	<end_page>35</end_page>
	<web_url>http://monadi.isc.org.ir/browse.php?a_code=A-10-407-19&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>Mahdi</first_name>
	<middle_name></middle_name>
	<last_name>Faraji</last_name>
	<suffix></suffix>
	<first_name_fa>مهدی</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>فرجی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>Mahdi.Faraji@Takian.ir</email>
	<code>10031947532846002163</code>
	<orcid>10031947532846002163</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Takian Co., Tehran, Iran</affiliation>
	<affiliation_fa>شرکت تاکیان، تهران، ایران</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
