Building firewalls with intelligent network interface cards

نویسندگان

  • David Friedman
  • David Nagle
چکیده

The primary method for protecting networks today is to use a rewall: a boundary separating the protected network from the untrusted Internet. However, these rewalls o er no protection from internal attacks, scale poorly due to limited rewall processing capacity, and do not support mobile computing. Distributing a rewall to each network host avoids many of these problems, but weakens the security guarantees of the network since it places the rewall under the control of the host OS. Leveraging the increasing capability of embedded-VLSI, including network-speci c processors, we propose a Network Interface Card (NIC) based distributed rewall. Supporting the same (and more) functions as a centralized rewall, NIC-based rewalls provide signi cant bene ts including: scalability, easier client customization, sharing application/OS state to enable application-level ltering, and the ability to block misbehaving hosts at the source, the host itself. We describe the architecture of a Network Interface Card-based distributed rewall and our implementation, which uses an i960-based NIC and IPsec for management and policy distribution. The rewall currently supports basic packet ltering and some application policies as well as secure policy distribution. This research is supported by the member companies of the Parallel Data Consortium. At the time of this writing, these companies include EMC Corporation, Hewlett-Packard Labs, Hitachi, IBM corporation, Intel Corporation, LSI Logic, Lucent Technologies, Network Appliance, PANASAS, L.L.C., Platys Communications, Seagate Technology, Snap Appliances, Sun Microsystems and Veritas Software Corporation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building Firewalls with Intelligent Network Interface Cards (CMU-CS-00-173)

The primary method for protecting networks today is to use a rewall: a boundary separating the protected network from the untrusted Internet. However, these rewalls o er no protection from internal attacks, scale poorly due to limited rewall processing capacity, and do not support mobile computing. Distributing a rewall to each network host avoids many of these problems, but weakens the securit...

متن کامل

LAN security: problems and solutions for Ethernet networks

Despite many research and development efforts in the area of data communications security, the importance of internal Ž . local area network LAN security is still underestimated. This paper discusses why many traditional approaches to network Ž . security e.g. firewalls, the modern IPSec or various application level protocols are not so effective in local networks and proposes a prospective sol...

متن کامل

Design of a Hybrid Modular P4-Compatible Switch

Network Function Virtualization (NFV) shed new light for the design, deployment, and management of cloud networks. Many network functions such as firewalls, load balancers, and intrusion detection systems can be virtualized by servers. However, network operators often have to sacrifice programmability in order to achieve high throughput, especially at networks’ edge where complex network functi...

متن کامل

On Using Intelligent Network Interface Cards to support Multimedia Applications

The emergence of fast, cheap embedded processors presents the opportunity for inexpensive processing to occur on the network interface. We are investigating how a system design incorporating such an intelligent network interface can be used to support streaming multimedia applications. We are developing an extensible execution environment, called SPINE, that enables applications to compute dire...

متن کامل

Fraud Detection of Credit Cards Using Neuro-fuzzy Approach Based on TLBO and PSO Algorithms

The aim of this paper is to detect bank credit cards related frauds. The large amount of data and their similarity lead to a time consuming and low accurate separation of healthy and unhealthy samples behavior, by using traditional classifications. Therefore in this study, the Adaptive Neuro-Fuzzy Inference System (ANFIS) is used in order to reach a more efficient and accurate algorithm. By com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001