2012 IEEE International Conference on Communications (ICC) 2012
DOI: 10.1109/icc.2012.6364218
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
20
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 18 publications
1
20
0
Order By: Relevance
“…Thus, in this paper we emphasize on these important optimization points that haven't been considered in previous works. This paper significantly extends our preliminary work described in (Trabelsi and Zeidan, 2012), in which the filter fields were ranked according to their packet rejection probabilities. In (Trabelsi and Zeidan, 2012), a brief analysis and preliminary results were presented using special types of generated traffic (high non-matching traffic and high matching traffic).…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…Thus, in this paper we emphasize on these important optimization points that haven't been considered in previous works. This paper significantly extends our preliminary work described in (Trabelsi and Zeidan, 2012), in which the filter fields were ranked according to their packet rejection probabilities. In (Trabelsi and Zeidan, 2012), a brief analysis and preliminary results were presented using special types of generated traffic (high non-matching traffic and high matching traffic).…”
Section: Related Workmentioning
confidence: 97%
“…On the other hand, for the high matching traffic the slight difference was due to the small packet rejection percentage. Moreover, the work in (Trabelsi and Zeidan, 2012) presented only abstract overviews without including any technical details. The math model mainly used ChieSquare Test to rank the filters according to their previous non-matching frequencies (rejection frequencies).…”
Section: Related Workmentioning
confidence: 99%
“…An improvement of this technique is combined with consideration of the nature of the data to reduce the average number of filters that each packet has to go through [6]. The difference of technique [6] to [2] are: packet filtering process has been carried out on all cases, however filters are arranged in descending order staring from the field with the highest rejection statistics.…”
Section: ) Self Adjusting Binary Search On Prefix Lengths (Sa-bspl)mentioning
confidence: 99%
“…The difference of technique [6] to [2] are: packet filtering process has been carried out on all cases, however filters are arranged in descending order staring from the field with the highest rejection statistics. For example, according to the type of the packet rate due to invalid source IP address, destination IP, source port, destination port, respectively: 30%, 40%, 10%, 20%, the actual order current filtering will be done in this order: destination IP, source IP, destination port, source port.…”
Section: ) Self Adjusting Binary Search On Prefix Lengths (Sa-bspl)mentioning
confidence: 99%
“…Therefore, they used the B+ tree data structure with RSA accumulators for the authentication scheme, which requires lower computational costs for membership queries in a dynamic data set. Trabelsi & Zeidan (2012) provided in 2012 a mechanism to improve the filtering time of firewall packets by optimizing the comparison order of the matched security-rule fields to decide on the early rejection of incoming packets. Their proposed mechanism was based on changing the order of filtering fields according to traffic statistics.…”
Section: Introductionmentioning
confidence: 99%