Description and Analysis of Embedded Firewall Techniques

With the turn of this century, many researchers started showing interest in Embedded Firewall (EF) implementations. These are not the usual firewalls that are used as checkpoints at network gateways. They are, rather, applied near those hosts that need protection. Hence by using them, individual or grouped network components can be protected from the inside as well as from external attacks. This paper presents a study of EF-s, looking at their architecture and problems. A comparative study assesses how practical each kind is. It particularly focuses on the architecture, weak points, and portability of each kind. A look at their use by different categories of users is also presented.




References:
[1] Terry Ogletree. Practical Firewalls. First Edition June 12, 2000.
[2] Lynn M. Meredith. A Summary of the Automatic Distributed Firewalls
(ADF) Project, Proceedings of the DARPA Information Survivability
Conference and Exposition (DISCEX-03) IEEE 2003.
[3] Tom Markham, Lynn Meredith, and Charlie Payne. Distributed
Embedded Firewalls with Virtual Private Groups, Proceedings of the
DARPA Information Survivability Conference and Exposition
(DISCEX-03), IEEE 2003.
[4] Chu-Hsing Lin, Jung-Chun Liu, Chein-Ting Kuo, Mei-Cou, Tsung-Che
Yang. Safeguard Intranet Using Embedded and Distributed Firewall
System, 2008 Second International Conference on Future Generation
Communication and Networking, IEEE 2008.
[5] Quan Huang, Shengke Qiu, Shicun Qin, Cheng Cao. An Embedded
Firewall Based on Network Processor, Proceedings of the Second
International Conference on Embedded Software and Systems
(ICESS-05), IEEE 2005.
[6] Charles Payne, Tom Markham. Architecture and Applications for a
Distributed Embedded Firewall, Proceedings of the 17th Annual
Computer Security Applications Conference, IEEE 2001.
[7] Vassilis Prevelakis, Angelos Keromytis. Designing an Embedded
Firewall/VPN Gateway, Proceedings of the International Network
Conference 2002, Plymouth, UK.
[8] Vassilis Prevelakis. The Virtual Firewall, USENIX; login: Magazine,
December 2005, Volume 30, Number 6.
[9] Wikipedia, Virtual Machine, http://en.wikipedia.org/wiki/
Virtual_machine, Get the Information on Monday, May 18, 2009.7:49am.