Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches | SpringerLink
Skip to main content

Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches

  • Conference paper
Wired/Wireless Internet Communications (WWIC 2006)

Abstract

In this paper we discuss IP layer packet filtering and an application level gateway approach used to secure handheld devices when providing and using web services. We propose a firewall management plane as a means for cross layer interaction. In our approach the application level gateway updates the IP layer firewall rules based on its knowledge about whether or not a certain source is sending malicious packets. We show that such a cross layer interaction can significantly decrease the CPU load in case of attacks, i.e., if many malicious packets arrive at the handheld device. Our measurement results show that the additional overhead for IP layer filtering is less than 10 per cent, if the number of applied rule sets is less than 200. In addition our cross layer approach can reduce the CPU load caused by the application layer gateway by about 10 up to 30 per cent.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Netfilter/iptables Project Homepage, http://www.netfilter.org

  2. nf-HiPAC: High Performance Firewall for Linux Netfilter, http://www.hipac.org

  3. Extensible Markup Language (XML) 1.0 (3rd edn.), http://www.w3.org/TR/2004/REC-xml-20040204

  4. http://webservices.xml.com

  5. Wireless Security Software for Handheld Mobile Devices from Bluefire Security Technologies, http://www.bluefiresecurity.com/

  6. Trust Digital - Solutions - TRUST Mobile Device Applications, http://www.trustdigital.com

  7. Security Basics for PDAs and Handheld PCs, http://www.smallbusinesscomputing.com/webmaster/article.php/10732_3400641_2

  8. Web Services Security (WS-Security), http://www-106.ibm.com/developerworks/webservices/library/ws-secure/

  9. XML Encryption Syntax and Processing, http://www.w3.org/TR/xmlenc-core/

  10. Reactivity: The Secure Web Services Deployment System, http://www.reactivity.com/

  11. Forum Systems, Inc. - The Leader In Web Services Security, http://www.forumsystems.com

  12. XML-Security-C, http://xml-security-c.sourceforge.net

  13. Handhelds.org - Open Source Operating Systems for Handheld Devices, www.handhelds.org

  14. OASIS, Security Assertion Markup Language (SAML) V2.0, available at http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security#samlv20

  15. Robert van Engelen, gSOAP 2.7.2 User Guide, available at: http://gsoap2.com/sourceforge

  16. Forum Systems: Anatomy of a Web Services Attack: A Guide to Threats and Preventive Countermeasures (2004), available at http://forumsystems.com/papers/Anatomy_of_Attack_wp.pdf

  17. Bellovin, M.: nf-HiPAC High Performance Packet Classification High Performance Packet Classification for Linux Netfilter (2005), available at: http://www.hipac.org/documentation/nf-hipac-nfws2005.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Langendoerfer, P., Lehmann, M., Piotrowski, K. (2006). Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches. In: Braun, T., Carle, G., Fahmy, S., Koucheryavy, Y. (eds) Wired/Wireless Internet Communications. WWIC 2006. Lecture Notes in Computer Science, vol 3970. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11750390_14

Download citation

  • DOI: https://doi.org/10.1007/11750390_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34023-2

  • Online ISBN: 978-3-540-34024-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics