The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE) 2013
DOI: 10.1109/jcsse.2013.6567326
|View full text |Cite
|
Sign up to set email alerts
|

Towards a new design of firewall: Anomaly elimination and fast verifying of firewall rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…A firewall system operation is based on first-match criterion to determine which rule should be applied to which packet. The filtering ruleset is sequential and divided into two parts, namely predicate and decision and is of the form [11], [10].…”
Section: A Experiments 1: Unauthorized Access Prevention By the Firewallmentioning
confidence: 99%
See 2 more Smart Citations
“…A firewall system operation is based on first-match criterion to determine which rule should be applied to which packet. The filtering ruleset is sequential and divided into two parts, namely predicate and decision and is of the form [11], [10].…”
Section: A Experiments 1: Unauthorized Access Prevention By the Firewallmentioning
confidence: 99%
“…A firewall F executes two steps when an incoming packet p reaches it. In the first step, it identifies the first rule r in the sequential ruleset whose <predicate> allots the value true to packet p due to the matches in the fields while in the second step, if the <decision> of rule r is to accept or to discard packet p, then, the firewall accepts or discards the packet as the case may be [11], [10].…”
Section: A Experiments 1: Unauthorized Access Prevention By the Firewallmentioning
confidence: 99%
See 1 more Smart Citation
“…It is observed that packets are checked against the rules serially which consumes most of the working time of firewall. Solution for this problem is to arrange rules in Binary Tree Firewall (BTF) [12]. In BTF rules are stored in binary tree which helps to reduce packet checking time.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we will refer these policies as Access Control Lists (ACL's). As defined in [6], an ACL is of the form {Predicate}  {Decision} where {Predicate} is represented over certain predefined packet fields. Typically, Cisco IOS-based security devices [13,15] contain the fields ACL ID, sequence number, protocol, source IP address, source wild card mask, destination IP address, destination wild card mask, destination port range and additional options (refer table 1).…”
Section: Introductionmentioning
confidence: 99%