Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices

نویسندگان

  • Peter Langendörfer
  • Krzysztof Piotrowski
  • Steffen Peter
  • Martin Lehmann
چکیده

In this paper we discuss packet filtering firewalls and an application level gateway approach used to secure handheld devices. We propose a firewall management plane as a means for cross layer interaction. In our approach the application level gateway updates the firewall rules based on its knowledge about whether or not a certain source is sending malicious packets. Hereby we pursue a policy of removing malicious packets as close as possible to the network interface. We show that in case of secure web service such a cross layer interaction can significantly decrease the CPU load in case of attacks, i.e., if many malicious packets arrive at the handheld device. Our measurement results show that our cross layer approach can reduce the CPU load caused by the application layer gateway by about 10 up to 30 per cent. Finally we propose an integrated firewall processing approach that promises further improvements. It integrates the application controlled firewall before the MAC and provides crosslayer mechanisms to reduce the performance issues of traditional firewall approaches.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software ins...

متن کامل

P-7: Effects of Long-Term Exposure to Radiofrequency Radiations Emitted by Common Mobile Jammers on Sperm Quality Parameters in Rat

Background Exposure to electromagnetic fields (EMFs) by using electrical machines, tools, industrial instruments, power lines, and communications devices has occurred as a result of technological developments and is causing a threat to normal lives. The aim of this study was to evaluate the effects of long-term exposure to radiofrequency (RF) radiations emitted by mobile jammers.on sperm qualit...

متن کامل

User Interface Design in Mobile Educational Applications

Introduction: User interfaces are a crucial factor in ensuring the success of mobile applications. Mobile Educational Applications not only provide flexibility in learning, but also allow learners to learn at any time and any place. The purpose of this article is to investigate the effective factors affecting the design of the user interface in mobile educational applications. Methods: Quantita...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Communications

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2007