The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2009 Proceedings of 18th International Conference on Computer Communications and Networks 2009
DOI: 10.1109/icccn.2009.5235232
|View full text |Cite
|
Sign up to set email alerts
|

Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs

Abstract: Abstract-Firewalls enforce a security policy by inspecting packets arriving or departing a network. This is often accomplished by sequentially comparing the policy rules with the header of an arriving packet until the first match is found. This process becomes time consuming as policies become larger and more complex. Therefore determining the appropriate action for arriving packets must be done as quickly as possible.The process of packet header matching can be improved if more popular rules appear earlier in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
16
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 4 publications
0
16
0
Order By: Relevance
“…Results presented here are most closely associated with the techniques developed in [10]. However, there are important differences between their and our methods.…”
Section: A Related Workmentioning
confidence: 95%
See 1 more Smart Citation
“…Results presented here are most closely associated with the techniques developed in [10]. However, there are important differences between their and our methods.…”
Section: A Related Workmentioning
confidence: 95%
“…In this section, we focus our literature study on related research that is close to our work in the areas of firewall rule conflict detection and optimization analysis [1], [4], [6], [8] and [10].…”
Section: A Related Workmentioning
confidence: 99%
“…Tapdiya and Fulp used a directed acyclic graph (DAG) reflecting the rule dependencies of a rule set and rearranged the rules so as to reduce the cost of rule comparisons [5]. Their method takes a further O(n 3 ) time to reorder the rules associated with the DAG.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [12] presented a heuristic algorithm for optimized policy RR that is able to re-order a policy containing precedence relationships (or a sub-graph in the DAG) in such a way that the policy integrity is maintained. A short synopsis of the most important aspects of this algorithm is given below.…”
Section: A Dag-based Algorithmmentioning
confidence: 99%