Distributing and Obfuscating Firewalls via Oblivious Bloom Filter Evaluation

10/03/2018
by   Ken Goss, et al.
0

Firewalls have long been in use to protect local networks from threats of the larger Internet. Although firewalls are effective in preventing attacks initiated from outside, they are vulnerable to insider threats, e.g., malicious insiders may access and alter firewall configurations, and disable firewall services. In this paper, we develop an innovative distributed architecture to obliviously manage and evaluate firewalls to prevent both insider and external attacks oriented to the firewalls. Our proposed structure alleviates these issues by obfuscating the firewall rules or policies themselves, then distributing the function of evaluating these rules across multiple servers. Thus, both accessing and altering the rules are considerably more difficult thereby providing better protection to the local network as well as greater security for the firewall itself. We achieve this by integrating multiple areas of research such as secret sharing schemes and multi-party computation, as well as Bloom filters and Byzantine agreement protocols. Our resulting solution is an efficient and secure means by which a firewall may be distributed, and obfuscated while maintaining the ability for multiple servers to obliviously evaluate its functionality.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/21/2021

A Survey on Perfectly-Secure Verifiable Secret-Sharing

Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure dis...
research
01/20/2020

Fides: Managing Data on Untrusted Infrastructure

Significant amounts of data are currently being stored and managed on th...
research
09/01/2016

Suspicious-Taint-Based Access Control for Protecting OS from Network Attacks

Today, security threats to operating systems largely come from network. ...
research
08/30/2021

Security For System-On-Chip (SoC) Using Neural Networks

With the growth of embedded systems, VLSI design phases complexity and c...
research
04/13/2018

Trustworthy Configuration Management for Networked Devices using Distributed Ledgers

Numerous IoT applications, like building automation or process control o...
research
10/19/2020

Secure Consensus Generation with Distributed DoH

Many applications and protocols depend on the ability to generate a pool...
research
01/17/2023

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

The massive trend toward embedded systems introduces new security threat...

Please sign up or login with your details

Forgot password? Click here to reset