Proceedings of the 6th International Conference on Communication and Network Security 2016
DOI: 10.1145/3017971.3017975
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based Paradigm

Abstract: Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed and controlled on the Internet.Additionally, an ever-increasingly amount of sensitive information will be stored on various networks. A good and efficient firewall strategy will attempt to secure this information, and to also manage the large amount of inevitable network traffic that these devices … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…As shown in Fig. 7, the proposed method decreases the latency by about 11% compared to Tanaka et al [13], SGM [10], and Hikage et al [12]. This 11% reduction of classification latency is large improvement.…”
Section: Methodsmentioning
confidence: 73%
See 1 more Smart Citation
“…As shown in Fig. 7, the proposed method decreases the latency by about 11% compared to Tanaka et al [13], SGM [10], and Hikage et al [12]. This 11% reduction of classification latency is large improvement.…”
Section: Methodsmentioning
confidence: 73%
“…We say that ordering σ satisfies the dependency relation if, for any dependent rules r i and r j (i < j), r i is placed ahead of r j in σ. Most researchers define a constraint for ORO such that an ordering must satisfy the overlap relation [2], [7]- [12].…”
Section: Definition 3: (Roro)mentioning
confidence: 99%
“…The SLWE has found numerous successful applications in the literature. Applications of the SLWE include adaptive classifiers for spam filtering [36], adaptive file encoding with nonstationary distributions [26], intrusion detection in computer networks [30], tracking shifts of languages in online discussions [29], learning user preferences under concept-shift [22,33], fault-tolerant routing in Ad-hoc networks [21], digital content forensics for detecting illicit images [8], detection and tracking of malicious nodes in both Ad-hoc networks [24], vehicular mobile WiMAX networks [18], and optimizing firewall matching time via dynamic rule ordering [19]-to mention a few.…”
Section: Introductionmentioning
confidence: 99%
“…The SLWE has found numerous successful applications in the literature. Applications of the SLWE include adaptive classifiers for spam filtering [27], adaptive file encoding with nonstationary distributions [20], intrusion detection in computer networks [24], tracking shifts of languages in online discussions [23], learning user preferences under conceptshift [16], [26], fault-tolerant routing in Ad-hoc networks [15], digital content forensics for detecting illicit images [8], 1 Hugo Lewi Hammer and Anis Yazidi are with Department of Computer Science at Oslo and Akershus University College of Applied Sciences, Pilestredet 35, N-0166 Oslo, Norway {hugo.hammer,anis.yazidi}@hioa.no detection and tracking of malicious nodes in both Ad-hoc networks [18], vehicular mobile WiMAX networks [13], and optimizing firewall matching time via dynamic rule ordering [14]-to mention a few.…”
Section: Introductionmentioning
confidence: 99%