A Kind of Embedded Firewall Mechanism for ARM Processors

Article Preview

Abstract:

The traditional firewall is a protect mechanism usually between the internal and external network, through the input and output of data packets in real-time network monitoring, it will make protective response immediately if it find security threats. With short data processing time and high efficiency, it can satisfy most procedures of application, but it has high cost and is difficult to achieve. In this paper, in view of these problems, embedded firewall security protection mechanisms set based AMR processor innovation, given the overall framework of embedded firewall hardware and the design for software architecture ,I selected good performance S3C2410X embedded chip, the embedded firewall network card drivers, key technologies of application research in detail, based on the embedded firewall performance of AMR processor through the contrast test ,the communication rate can reach 15.5Mpbs, 2.15times higher than that of general processor communication performance.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1757-1760

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Ren Anxi, Yang Shou-Bao, LI An optimization method matching. firewall rules based on statistical analysis of Computer Engineering and Applications 2006 (04) : 28-31.

Google Scholar

[2] ZHAO Yue-hua, Zhou Wansheng. Firewall filtering rules to dynamically generate design. Computer Engineering 2012 (02) : 35-38.

Google Scholar

[3] Ning Hongliang, under the principle toward Truman. Linux platform firewall and application. Technological innovation Herald 2012 (06) : 45-52.

Google Scholar

[4] Lee, the Wu Jie, Lv Zhihui, Yang Ming. Based distributed file system management and optimization of Web services. Computer Engineering and Design 2012 (01) : 25-29.

Google Scholar

[5] Xiang-Lin, IDS and firewall network security model linkage design appropriate for the river. TECHNOLOGY 2011 (02) 71-76.

Google Scholar

[6] Al-Shaer E, El-Atawy A, Samak T. Automated pseudo-livetesting of firewall configuration enforcement Network In-frastructure Configuration. 2009: 67-71.

DOI: 10.1109/jsac.2009.090406

Google Scholar