2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security 2014
DOI: 10.1109/hpcc.2014.135
|View full text |Cite
|
Sign up to set email alerts
|

Security Mechanisms for a Cooperative Firewall

Abstract: A solution is proposed at COMNET department of Aalto University, which is called Customer Edge Switching and it has resulted in a prototype called Customer Edge Switches (CES). While it addresses many of the current Internet issues i.e. reachability problem, IPv4 address space depletion, so far security has generally been considered out of scope.This thesis aims at identifying the security vulnerabilities present within the CES architecture.The architecture is secured against various network attacks by present… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 32 publications
0
11
0
Order By: Relevance
“…Towards that end, we propose a cloud‐based firewall, namely, CES that would make the hosts cooperative in nature. It follows the firewalling model of mobile broadband networks, where mobile hosts are behind a network‐based firewall.…”
Section: Implementing Internet‐wide Trust Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Towards that end, we propose a cloud‐based firewall, namely, CES that would make the hosts cooperative in nature. It follows the firewalling model of mobile broadband networks, where mobile hosts are behind a network‐based firewall.…”
Section: Implementing Internet‐wide Trust Managementmentioning
confidence: 99%
“…To outline the feasibility of cooperation among Internet networks, the paper briefly describes the implementation of our solution particularly in 5G. The overall 2-tier security solution proposes: (1) a network-based firewall (Customer Edge Switching [CES] [17][18][19][20][21][22][23][24] ) that addresses inherent Internet vulnerabilities and security at the level of interaction between customer networks and (2) an Internet-wide evidence collection, aggregation, and reputation system. This paper concerns with the latter, i.e.…”
mentioning
confidence: 99%
“…The communication between the end hosts is brokered by the CES nodes, and the policies defined are enforced via the CETP protocol. The following mechanisms are proposed to minimize the risks against network abuse . CETP Cookie TLV : It follows a similar approach to TCP cookie in order to mitigate TCP SYN flood attacks.…”
Section: The Architecture Of Customer Edge Switchingmentioning
confidence: 99%
“…The communication between the end hosts is brokered by the CES nodes, and the policies defined are enforced via the CETP protocol. The following mechanisms are proposed to minimize the risks against network abuse [8].…”
Section: Ces-to-ces Communicationsmentioning
confidence: 99%
“…Moreover, we propose to use a cooperative firewall that allows queries to, e.g., the sender's firewall and certification authorities before making the final admission decision. This allows dissolving the boundary between closed and open networks, all managed by the policy [14]. A mobile device under the cooperative firewall is reachable using the host fully qualified domain name (FQDN), a suitable identity and the routing locator of the iOFS.…”
Section: Access Appmentioning
confidence: 99%