Description and Analysis of Embedded Firewall Techniques
With the turn of this century, many researchers
started showing interest in Embedded Firewall (EF) implementations.
These are not the usual firewalls that are used as checkpoints at network gateways. They are, rather, applied near those hosts that need protection. Hence by using them, individual or grouped network
components can be protected from the inside as well as from external attacks.
This paper presents a study of EF-s, looking at their architecture and problems. A comparative study assesses how practical each kind is. It particularly focuses on the architecture, weak points, and
portability of each kind. A look at their use by different categories of users is also presented.
[1] Terry Ogletree. Practical Firewalls. First Edition June 12, 2000.
[2] Lynn M. Meredith. A Summary of the Automatic Distributed Firewalls
(ADF) Project, Proceedings of the DARPA Information Survivability
Conference and Exposition (DISCEX-03) IEEE 2003.
[3] Tom Markham, Lynn Meredith, and Charlie Payne. Distributed
Embedded Firewalls with Virtual Private Groups, Proceedings of the
DARPA Information Survivability Conference and Exposition
(DISCEX-03), IEEE 2003.
[4] Chu-Hsing Lin, Jung-Chun Liu, Chein-Ting Kuo, Mei-Cou, Tsung-Che
Yang. Safeguard Intranet Using Embedded and Distributed Firewall
System, 2008 Second International Conference on Future Generation
Communication and Networking, IEEE 2008.
[5] Quan Huang, Shengke Qiu, Shicun Qin, Cheng Cao. An Embedded
Firewall Based on Network Processor, Proceedings of the Second
International Conference on Embedded Software and Systems
(ICESS-05), IEEE 2005.
[6] Charles Payne, Tom Markham. Architecture and Applications for a
Distributed Embedded Firewall, Proceedings of the 17th Annual
Computer Security Applications Conference, IEEE 2001.
[7] Vassilis Prevelakis, Angelos Keromytis. Designing an Embedded
Firewall/VPN Gateway, Proceedings of the International Network
Conference 2002, Plymouth, UK.
[8] Vassilis Prevelakis. The Virtual Firewall, USENIX; login: Magazine,
December 2005, Volume 30, Number 6.
[9] Wikipedia, Virtual Machine, http://en.wikipedia.org/wiki/
Virtual_machine, Get the Information on Monday, May 18, 2009.7:49am.
[1] Terry Ogletree. Practical Firewalls. First Edition June 12, 2000.
[2] Lynn M. Meredith. A Summary of the Automatic Distributed Firewalls
(ADF) Project, Proceedings of the DARPA Information Survivability
Conference and Exposition (DISCEX-03) IEEE 2003.
[3] Tom Markham, Lynn Meredith, and Charlie Payne. Distributed
Embedded Firewalls with Virtual Private Groups, Proceedings of the
DARPA Information Survivability Conference and Exposition
(DISCEX-03), IEEE 2003.
[4] Chu-Hsing Lin, Jung-Chun Liu, Chein-Ting Kuo, Mei-Cou, Tsung-Che
Yang. Safeguard Intranet Using Embedded and Distributed Firewall
System, 2008 Second International Conference on Future Generation
Communication and Networking, IEEE 2008.
[5] Quan Huang, Shengke Qiu, Shicun Qin, Cheng Cao. An Embedded
Firewall Based on Network Processor, Proceedings of the Second
International Conference on Embedded Software and Systems
(ICESS-05), IEEE 2005.
[6] Charles Payne, Tom Markham. Architecture and Applications for a
Distributed Embedded Firewall, Proceedings of the 17th Annual
Computer Security Applications Conference, IEEE 2001.
[7] Vassilis Prevelakis, Angelos Keromytis. Designing an Embedded
Firewall/VPN Gateway, Proceedings of the International Network
Conference 2002, Plymouth, UK.
[8] Vassilis Prevelakis. The Virtual Firewall, USENIX; login: Magazine,
December 2005, Volume 30, Number 6.
[9] Wikipedia, Virtual Machine, http://en.wikipedia.org/wiki/
Virtual_machine, Get the Information on Monday, May 18, 2009.7:49am.
@article{"International Journal of Information, Control and Computer Sciences:59415", author = "Ahmed Abou Elfarag and A. Baith M. and Hassan H. Alkhishali", title = "Description and Analysis of Embedded Firewall Techniques", abstract = "With the turn of this century, many researchers
started showing interest in Embedded Firewall (EF) implementations.
These are not the usual firewalls that are used as checkpoints at network gateways. They are, rather, applied near those hosts that need protection. Hence by using them, individual or grouped network
components can be protected from the inside as well as from external attacks.
This paper presents a study of EF-s, looking at their architecture and problems. A comparative study assesses how practical each kind is. It particularly focuses on the architecture, weak points, and
portability of each kind. A look at their use by different categories of users is also presented.", keywords = "Embedded Firewall (EF), Network Interface Card (NIC), Virtual Machine Software (VMware), Virtual Firewall (VF).", volume = "3", number = "10", pages = "2443-6", }