2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications 2008
DOI: 10.1109/infocom.2007.44
|View full text |Cite
|
Sign up to set email alerts
|

Firewall Compressor: An Algorithm for Minimizing Firewall Policies

Abstract: Abstract-A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to examine every packet and decide whether to accept or discard it based upon the firewall's policy. This policy is specified as a sequence of (possibly conflicting) rules. When a packet comes to a firewall, the firewall searches for the first rule that the packet matches, and executes the decision of that rule.With the explosive growth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
51
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(51 citation statements)
references
References 3 publications
0
51
0
Order By: Relevance
“…This problem is reformulated as a scheduling problem where each single field rule is a task and the goal is to obtain a schedule with the minimum number of tasks [17]. This technique was previously used by Suri to compress the number of entries in a routing table [18].…”
Section: Rule Reduction Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…This problem is reformulated as a scheduling problem where each single field rule is a task and the goal is to obtain a schedule with the minimum number of tasks [17]. This technique was previously used by Suri to compress the number of entries in a routing table [18].…”
Section: Rule Reduction Techniquesmentioning
confidence: 99%
“…If the destination node of the edge only has a single incoming edge, then the node can be safely deleted as it cannot be part of a discard path. Firstly, the node is removed from the node list and its memory is deallocated (lines [17][18]. The process repeats until the stack becomes empty.…”
Section: Fdd Pruningmentioning
confidence: 99%
“…Some also compute reachability and determine if firewalls enforce an overall policy. We use BDDs from [16] for efficient rule application which are similar in purpose to Michigan State's Firewall Decision Diagrams (FDDs) [27]- [29].…”
Section: Related Workmentioning
confidence: 99%
“…Although TCAM Razor achieves higher compression ratio than using redundancy removal alone, our redundancy removal algorithm can handle classifier updates more efficiently because redundancy removal does not rewrite any rule. In [30], Liu et al presented an algorithm for compressing firewall rules. Although the compression algorithm in [30] can be used to compress general packet classifiers, it compresses rules specified in ranges, not in prefixes.…”
Section: Related Workmentioning
confidence: 99%
“…In [30], Liu et al presented an algorithm for compressing firewall rules. Although the compression algorithm in [30] can be used to compress general packet classifiers, it compresses rules specified in ranges, not in prefixes.…”
Section: Related Workmentioning
confidence: 99%