Corpus ID: 11471536

A $35 Firewall for the Developing World

  title={A \$35 Firewall for the Developing World},
  author={Z. Nabi},
  • Z. Nabi
  • Published 2014
  • Computer Science
  • ArXiv
A number of recent efforts aim to bridge the global digital divide, particularly with respect to Internet access. We take this endeavor one step further and argue that Internet access and web security go hand in glove in the developing world. To remedy the situation, we explore whether low-cost platforms, such as Raspberry Pi (\$35) and Cubieboard (\$59), can be used to implement security mechanisms. Using a firewall as a motivating security application we benchmark its performance on these… Expand
2 Citations
Measurement of Raspberry Pi performance in network traffic analysis
A SYN flood and Smurf attack was made by a user a 3 minute to listen to the network traffic and measure the performance of the Raspberry Pi, and performance values of CPU, ram and packet delivery were obtained. Expand
Performance Comparison of Open Source IDSs via Raspberry Pi
In this research, a scenario is created on a local network to listen to the network traffic and Snort and Suricata are installed on two different Raspberry Pi, to compare the performance of the IDSs. Expand


First-class access for developing-world environments
With this stack, it is believed that developing-world users will have a participatory Internet experience, similar to that of users in the US and Europe, and the stack is also geared toward a low resource footprint, making it deployable in cost-sensitive environments. Expand
Implementing a distributed firewall
This paper presents the design and implementation of a distributed rewall using the KeyNote trust management system to specify, distribute, and resolve policy, and OpenBSD, an open source UNIX operating system. Expand
Making middleboxes someone else's problem: network processing as a cloud service
APLOMB solves real problems faced by network administrators, can outsource over 90% of middlebox hardware in a typical large enterprise network, and, in a case study of a real enterprise, imposes an average latency penalty of 1.1ms and median bandwidth inflation of 3.8%. Expand
LCD-Net: lowest cost denominator networking
LCD-Net is proposed, a new Internet paradigm that architects multi-layer resource pooling Internet technologies to support benevolence in the Internet and emphasizes the need to identify and extend the stakeholder value chain to ensure such benevolent access to the Internet is sustainable. Expand
Botnets, Cybercrime and National Security
This chapter will address how botnet infrastructure could be exploited for national security and cybercrime purposes. Cyber threats, including botnets, represent a fast developing international issueExpand
HashCache: Cache Storage for the Next Billion
HashCache presents a radical departure from the conventional wisdom in network cache design, and uses 6 to 20 times less memory than current techniques while still providing comparable or better performance, and can be deployed in configurations not attainable with current approaches. Expand
The middlebox manifesto: enabling innovation in middlebox deployment
It is made the case that enabling innovation in middleboxes is at least as important, if not more important, as that for traditional switches and routers. Expand
Unikernels: library operating systems for the cloud
The Mirage prototype compiles OCaml code into unikernels that run on commodity clouds and offer an order of magnitude reduction in code size without significant performance penalty, and demonstrates that the hypervisor is a platform that overcomes the hardware compatibility issues that have made past library operating systems impractical to deploy in the real-world. Expand
A case for custom silicon in enabling low-cost information technology for developing regions
It is argued that custom integrated circuits can enable a new tier of low-cost information access devices with a price point that will make them widely accessible and, with control over the silicon, these systems can economically address many other challenges. Expand
Computing security in the developing world: a case for multidisciplinary research
This work describes some of the specific security risks in developing regions and their relationships with technical, political, social, and economic factors and presents concrete examples of how these factors affect the security of individuals, groups, and key applications such as mobile banking. Expand