Autor: |
Grossi, Marco1 (AUTHOR) marco.grossi8@unibo.it, Alfonsi, Fabrizio2 (AUTHOR) fabrizio.alfonsi@bo.infn.it, Prandini, Marco3 (AUTHOR) marco.prandini@unibo.it, Gabrielli, Alessandro2,4 (AUTHOR) alessandro.gabrielli@unibo.it |
Předmět: |
|
Zdroj: |
Future Internet. Sep2024, Vol. 16 Issue 9, p303. 22p. |
Abstrakt: |
One of the most common mitigations against network-borne security threats is the deployment of firewalls, i.e., systems that can observe traffic and apply rules to let it through if it is benign or drop packets that are recognized as malicious. Cheap and open-source (a feature that is greatly appreciated in the security world) software solutions are available but may be too slow for high-rate channels. Hardware appliances are efficient but opaque and they are often very expensive. In this paper, an open-hardware approach is proposed for the design of a firewall, implemented on off-the-shelf components such as an FPGA (the Xilinx KC705 development board), and it is tested using controlled Ethernet traffic created with a packet generator as well as with real internet traffic. The proposed system can filter packets based on a set of rules that can use the whitelist or blacklist approach. It generates a set of statistics, such as the number of received/transmitted packets and the amount of received/transmitted data, which can be used to detect potential anomalies in the network traffic. The firewall has been experimentally validated in the case of a network data throughput of 1 Gb/s, and preliminary simulations have shown that the system can be upgraded with minor modifications to work at 10 Gb/s. Test results have shown that the proposed firewall features a latency of 627 ns and a maximum data throughput of 0.982 Gb/s. [ABSTRACT FROM AUTHOR] |
Databáze: |
Library, Information Science & Technology Abstracts |
Externí odkaz: |
|
Nepřihlášeným uživatelům se plný text nezobrazuje |
K zobrazení výsledku je třeba se přihlásit.
|