The 18th IEEE International Conference on Network Protocols 2010
DOI: 10.1109/icnp.2010.5762766
|View full text |Cite
|
Sign up to set email alerts
|

Firewall modules and modular firewalls

Abstract: Abstract-A firewall is a packet filter placed at an entry point of a network in the Internet. Each packet that goes through this entry point is checked by the firewall to determine whether to accept or discard the packet. The firewall makes this determination based on a specified sequence of overlapping rules. The firewall uses the first-match criterion to determine which rule in the sequence should be applied to which packet. Thus, to compute the set of packets to which a rule is applied, the firewall designe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 19 publications
(19 reference statements)
0
9
0
Order By: Relevance
“…This is essential in that it will give objective metrics about how complex firewall policies are and thus will help firewall administrators to better manage and improve their policies. However, only a few work in the literature focuses on this topic [1,[6][7][8][9]]. In the current work, we present a workflow for designing, developing, and empirically validating metrics for quantifying complexity of firewall policies.…”
Section: Hotsosmentioning
confidence: 99%
“…This is essential in that it will give objective metrics about how complex firewall policies are and thus will help firewall administrators to better manage and improve their policies. However, only a few work in the literature focuses on this topic [1,[6][7][8][9]]. In the current work, we present a workflow for designing, developing, and empirically validating metrics for quantifying complexity of firewall policies.…”
Section: Hotsosmentioning
confidence: 99%
“…Such algorithms, that can generate a firewall from its specification, are provided in [2] and [17]. We develop a new approach to the problem of firewall design and demonstrate how to design a firewall as a set of modules, in [18]. Our current paper demonstrates that one of the most studied problems of firewall analysis, namely redundancy checking, is equivalent to firewall verification.…”
Section: ) Firewall Analysismentioning
confidence: 99%
“…A firewall F executes two steps when an incoming packet p reaches it. In the first step, it identifies the first rule r in the sequential ruleset whose <predicate> allots the value true to packet p due to the matches in the fields while in the second step, if the <decision> of rule r is to accept or to discard packet p, then, the firewall accepts or discards the packet as the case may be [11], [10].…”
Section: A Experiments 1: Unauthorized Access Prevention By the Firewallmentioning
confidence: 99%
“…A firewall system operation is based on first-match criterion to determine which rule should be applied to which packet. The filtering ruleset is sequential and divided into two parts, namely predicate and decision and is of the form [11], [10].…”
Section: A Experiments 1: Unauthorized Access Prevention By the Firewallmentioning
confidence: 99%
See 1 more Smart Citation