Firewall Design: Consistency, Completeness, and Compactness

Size: px
Start display at page:

Download "Firewall Design: Consistency, Completeness, and Compactness"

Transcription

1 C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas , U.S.A. {goua, Abstract A firewall is often place at the entrance of each private network in the Internet. The function of a firewall is to examine each packet that passes through the entrance an ecie whether to accept the packet an allow it to procee or to iscar the packet. A firewall is usually esigne as a sequence of rules. To make a ecision concerning some packets, the firewall rules are compare, one by one, with the packet until one rule is foun to be satisfie by the packet: this rule etermines the fate of the packet. In this paper, we present the first ever metho for esigning the sequence of rules in a firewall to be consistent, complete, an compact. Consistency means that the rules are orere correctly, completeness means that every packet satisfies at least one rule in the firewall, an compactness means that the firewall has no reunant rules. Our metho starts by esigning a firewall ecision iagram (FDD, for short) whose consistency an completeness can be checke systematically (by an algorithm). We then apply a sequence of five algorithms to this FDD to generate, reuce an simplify the target firewall rules while maintaining the consistency an completeness of the original FDD. To perform its function, a firewall consists of a sequence of rules; each rule is of the form preicate where the preicate is a boolean expression over the ifferent fiels of a packet, an the ecision is either a (for accept) or (for iscar). To reach a ecision concerning a packet, the rules in the sequence are examine one by one until the first rule, whose preicate is satisfie by the packet fiels, is foun. The ecision of this rule is applie to the packet. Designing the sequence of rules for a firewall is not any easy task. In fact, the sequence of rules for any firewall nees to be consistent, complete, an compact as we illustrate by the next (amittely simple) example. Example: Figure 1 shows a private network that contains a mail server s an a host h. The private network is connecte to the firewall via interface 1, whereas the rest of the Internet is connecte to the firewall via interface 0. The rest of the Internet has a malicious host m. Internet 0 1 Mail Server Host Host 1. Introuction A firewall is often place at each entry point of private network in the Internet. The function of this firewall is to provie secure access to an from the private network. In particular, any packet that attempts to enter or leave the private at some entry point is first examine by the firewall locate at that point, an epening on the ifferent fiels of the packet, the firewall ecies either to accept the packet an allow it to procee in its way, or to iscar the packet. Figure 1. A firewall in a simple network In this example, we assume that each packet has five fiels name as follows: I is the interface on which the packet reaches the firewall S is the original source of the packet D is the ultimate estination of the packet P is the transport protocol of the packet

2 T is the estination port of the packet The firewall in this example consists of the following sequence ( I = 0 S = any D = s P = tcp T = 25 a, I = 0 S = any D = s P = any T = any, I = 0 S = m D = any P = any T = any, I = 1 S = h D = any P = any T = any a, I = 1 S = any D = any P = any T = any a) We refer to these five rules as r 0 through r 4, respectively. Rule r 0 accepts each incoming SMTP packet whose ultimate estination is a mail server s. Rule r 1 iscars each incoming non-smtp packet whose ultimate estination is s. Rule r 2 iscars each incoming packet whose original source is a malicious host m. Rule r 3 accepts each outgoing packet whose original source is a host h. Rule r 4 accepts each outgoing packet. Next, we argue that this sequence of five rules suffers from three types of errors: consistency errors, completeness errors, an compactness errors. The two rules r 0 an r 2 are conflicting because there are packets whose fiels satisfy the preicates of both r 0 an r 2 (for example, a packet where I = 0, S = m, D = s, P = tcp, an T = 25 satisfies the preicates of both r 0 an r 2 ) an these two rules have ifferent ecisions. Therefore, the relative orer of these two rules with respect to one another in the sequence of rules becomes very critical. For example, by placing rule r 2 behin rule r 0 in the above rule sequence, the firewall accepts all incoming SMTP packets even those that originate at the malicious host m. This relative orer of rules r 0 an r 2 is likely a consistency error. This error can be correcte by placing rule r 2 at the beginning of the sequence of rules ahea of rule r 1. This correction will cause the firewall to iscar all incoming packets, incluing SMTP packets, that originate at the malicious host m. The secon error in the above rule sequence is that any packet where I = 0, S m, an D s oes not satisfy the preicate of any of the five rules r 0 through r 5. We refer to such an error as a completeness error. This error can be correcte by aing the following new rule immeiately before rule r 3 I = 0 S = any D = any P = any T = any a The thir error in the above rule sequence is that rule r 3 is reunant; i.e., this rule can be remove without affecting the set of all packets accepte by the rule sequence an without affecting the set of all packets iscare by the rule sequence. We refer to such an error as a compactness error. This error can be correcte by removing rule r 3 from the above rule sequence. After we preform these corrections, we en up with the following sequence of rules. ( I = 0 S = m D = any P = any T = any, I = 0 S = any D = s P = tcp T = 25 a, I = 0 S = any D = s P = any T = any, I = 0 S = any D = any P = any T = any a, I = 1 S = any D = any P = any T = any a) In this paper, we present a metho for esigning the sequence of rules of a firewall to be consistent, complete, an compact. Accoring to this metho, a firewall esigner starts by specifying what we call a firewall ecision iagram whose consistency an completeness can be checke systematically (by an algorithm). Then, the esigner applies a sequence of five algorithm to this firewall ecision iagram to generate a compact sequence of firewall rules while maintaining the consistency an completeness of the original iagram. 2. Relate Work Design errors in existing firewalls have been reporte in [3]. Yet, most of the research in the area of firewalls an packet classifiers was not eicate to the problem of how to esign correct firewalls. Rather, most of the research in this area was eicate to eveloping efficient ata structures that can spee up the checking of firewall rules when a new packet reaches a firewall. Examples of such ata structures are the trie ata structures in [12], area-base quatrees [6], fat inverte segment trees [8]. A goo survey of these ata structures is presente in [9]. Another research irection in the area of firewall esign has been eicate to the evelopment of high-level specification languages that can be use in specifying firewall rules. Examples of such languages are the simple moel efinition language in [3], the Lisp-like language in [10], the eclarative preicate language in [4], an the high level firewall language in [1]. However, none of these specification languages is able to simplify the task of ensuring consistency, completeness, an compactness of the firewalls being specifie. Perhaps the research irection that is closest to the spirit of the current papers is reporte in [11], [7], [2]. This research irection is eicate to etecting every pair of conflicting rules in a firewall. Each etecte pair of conflicting rules is then presente to the firewall esigner who ecies whether the two rules nee to be swappe or a new rule nee to be ae. However, these methos o not eal with the completeness an compactness errors of a firewall. Accoring to the firewall esign metho in the current paper, firewalls are first specifie as firewall ecision iagrams. These ecision iagrams are similar, but not ientical, to other types of ecision iagrams such as the Binary Decision Diagrams in [5] an the Interval Decision Diagrams in [13].

3 3. Firewall Decision Diagrams (FDDs) [4,5] A fiel F i is a variable whose value is taken from a preefine interval of nonnegative integers, calle the omain [6,7] F of F i an enote by D(F i ). [2,3] 1 F [0,1] [2,3] 1 PSfrag replacements[5,7] [4,4] [5,7] A packet over the fiels F 0,, F n 1 is an n-tuple (p 0,, p n 1 ) where each p i is taken from the omain a a D(F i ) of the corresponing fiel F i. A firewall ecision iagram f (or FDD f, for short) over the fiels F 0,, F n 1 is an acyclic an irecte graph that satisfies the following five conitions: 1. f has exactly one noe that has no incoming eges, calle the root of f, an has two or more noes that have no outgoing eges, calle the terminal noes of f. 2. Each nonterminal noe v in f is labelle with a fiel, enote by F (v), taken from the set of fiels F 0,, F n 1. Each terminal noe v in f is labelle with a ecision that is either accept (or a for short) or iscar (or for short). 3. A irecte path from the root to a terminal noe in f is calle a ecision path. No two noes on a ecision path in f have the same label. 4. Each ege e, that is outgoing of a noe v in f, is labelle with an integer set I(e), where I(e) is a subset of the omain of fiel F (v). 5. Let v be any terminal noe in f. The set E(v) of all outgoing eges of noe v satisfies the following two conitions: (a) Consistency: For any istinct e i an e j in E(v), I(e i ) I(e j ) = (b) Completeness: e E(v) I(e) = D(F (v)) where is the empty set an D(F (v)) is the omain of the fiel F (v). Figure 2 shows an FDD over two fiels F 0 an F 1. The omain of each fiel is the interval [0, 9]. Each ege in this FDD is labelle with a set of integers that is represente by one or more non-overlapping intervals (that cover the set of integers). For example, one outgoing ege of the root is labelle with the two intervals [0, 3] an [8, 9] that represent the set {0, 1, 2, 3, 8, 9}. Let f be an FDD over the fiels F 0,, F n 1. A ecision path in f is enote (v 0 e 0 v k 1 e k 1 v k ) where v 0 is the root noe in f, v k is a terminal noe in f, an each e i is a irecte ege from noe v i to noe v i+1 in f. Each ecision path (v 0 e 0 v k 1 e k 1 v k ) in an FDD f over the packet fiels F 0,, F n 1 can be represente as a rule of the form: F 0 [0,1] [4,4] Figure 2. An FDD [0,3] F 1 [0,4] [5,9] where ecision is the label of the terminal noe v k in the ecision path an each fiel F i satisfies one of the following two conitions: 1. No noe in the ecision path is labelle with fiel F i an S i is the omain of F i. 2. There is one noe v j in the ecision path that is labelle with fiel F i an S i is the label of ege e j in the ecision path. An FDD f over the fiels F 0,, F n 1 can be represente by a sequence of rules, each of them is of the form such that the following two conitions hol. First, each rule in the sequence represents a istinct ecision path in f. Secon, each ecision path in f is represente by a istinct rule in the sequence. Note that the orer of the rules in the sequence is immaterial. We refer to a sequence of rules that represents an FDD f as a firewall of f. A packet (p 0,, p n 1 ) over the fiels F 0,, F n 1 is sai to be accepte by an FDD f over the same fiels iff a firewall of f has a rule accept such that the conition p 0 S 0 p n 1 S n 1 hols. Similarly, a packet (p 0,, p n 1 ) over the fiels F 0,, F n 1 is sai to be iscare by an FDD f over the same fiels iff a firewall of f has a rule iscar such that the conition p 0 S 0 p n 1 S n 1 hols. Let Σ enote the set of all packets over the fiels F 0,, F n 1, an let f be an FDD over the same fiels. The accept set of f, enote f.accept, is the subset of Σ that contains all the packets accepte by f. Similarly, the iscar set of f, enote f.iscar, is the subset of Σ that contains all the packets iscare by f. Theorem 1 (Theorem of FDDs) For any FDD f over the fiels F 0,, F n 1,

4 1. f.accept f.iscar =, an 2. f.accept f.iscar = Σ where is the empty set an Σ is the set of all packets over the fiels F 0,, F n 1. Two FDDs f an f over the same fiels are sai to be equivalent iff they have ientical accepts sets an ientical iscar sets, i.e., 4. Reuction of FDDs f.accept = f.accept, an f.iscar= f.iscar. As iscusse in the precious section, the number of rules in a firewall of an FDD f equals the number of ecision paths in f. Thus, it is avantageous to reuce the number of ecision paths in an FDD without changing its semantics, i.e., without changing its accept an iscar sets. The proceure for reucing the number of ecision paths in an FDD without changing its accept an iscar sets is calle a reuction of this FDD. This proceure is iscusse in this section. But before we introuce the concept of a reuce FDD, we nee to introuce the concept of isomorphic noes in an FDD. Two noes v 0 an v 1 in an FDD f are calle isomorphic in f iff v 0 an v 1 satisfy one of the following two conitions: 1. Both v 0 an v 1 are terminal noes with ientical labels in f. 2. Both v 0 an v 1 are nonterminal noes an there is a one-to-one corresponence between the outgoing eges of v 0 an the outgoing eges of v 1 such that every pair of corresponing eges have ientical labels an are incoming of the same noe in f. An FDD f is calle reuce iff it satisfies the following three conitions: 1. f has no noe with exactly one outgoing ege. 2. f has no two eges that are outgoing of one noe an are incoming of another noe. 3. f has no two istinct isomorphic noes. The reuction proceure of FDDs is presente next. Algorithm 1: (Reuction of FDDs) input : an FDD f output: a reuce FDD that is equivalent to f Repeately apply the following three reuctions to f until none of them can be applie any further. 1. If f has a noe v 0 with only one outgoing ege e an if e is incoming of another noe v 1, then remove v 0 an e from f an make the incoming eges of v 0 incoming of v If f has two eges e 0 an e 1 that are outgoing of noe v 0 an incoming of noe v 1, then remove e 0 an make the label of e 1 be the integer set I(e 0 ) I(e 1 ), where I(e 0 ) an I(e 1 ) are the integer sets that labelle eges e 0 an e 1 respectively. 3. If f has two isomorphic noes v 0 an v 1, then remove noe v 1 an its outgoing eges, an make the incoming eges of v 0 incoming of v 1. Applying Algorithm 1 to the FDD in Figure 2 yiels the reuce FDD in Figure 3. Note that a firewall of the FDD in Figure 2 consists of six rules, whereas a firewall of the FDD in Figure 3 consists of three rules. PSfrag replacements [2,3] [5,7] 5. Marking of FDDs a F 0 [4,7] [0,3] [0,1] F 1 [4,4] Figure 3. A reuce FDD In section 8, we escribe an algorithm for replacing each rule in the firewall of a reuce FDD f by a sequence of simple rules. The total number of the resulting simple rules in the firewall equals the egree of a marke version of f. Next, we efine what we mean by a marke version of an FDD an its egree. A marke version f of a reuce FDD f is the same as f except that exactly one outgoing ege of each nonterminal noe in f is marke ALL. We aopt the convention: f.accept = f.accept, an f.iscar= f.iscar. We sometimes refer to f as a marke FDD. Figure 4 shows two marke versions f an f of the reuce FDD in Figure 3. In f, the ege labelle [4, 7] an the ege labelle [0, 1][4, 4][8, 9] are both marke ALL. In f, the ege labelle [0, 3][8, 9] an the ege labelle [0, 1][4, 4][8, 9] are both both marke ALL. The egree of a set of integers S, enote eg(s), is the smallest number of non-overlapping integer intervals that cover S. For example, the egree of the set

5 ag replacements [2,3] [5,7] a F 0 F 0 [4,7] [4,7] [0,3] [0,3] ALL [0,1] [0,1] F 1 [4,4] F [2,3] 1 [4,4] ALL [5,7] ALL ALL a (a) f (b) f Figure 4. Two marke FDDs (1) Fin an outgoing ege e j of v whose quantity (eg(e j ) 1) eg(v j ) is larger than or equal to the corresponing quantity of every other outgoing ege of v. (2) Mark ege e j with ALL. (3) Compute the egree of v as follows: eg(v) = k 1 i=0 (eg(e i) eg(v i )) en If Algorithm 2 is applie to the reuce FDD in Figure 3, we obtain the marke FDD in Figure 4(b). {0, 1, 2, 4, 7, 8, 9} is 3 because this set is covere by the three integer intervals [0, 2], [4, 4] an [7, 9]. The egree of an ege e in a marke FDD, enote eg(e), is efine as follows. If e is marke ALL, then eg(e) = 1. If e is not marke ALL, then eg(e) = eg(s) where S is the set of integers that labels ege e. The egree of a noe v in a marke FDD, enote eg(v), is efine recursively as follows. If v is a terminal noe, then eg(v) = 1. If v is a nonterminal noe with k outgoing eges e 0,, e k 1 that are incoming of noes v 0,, v k 1 respectively, then k 1 eg(v) = eg(e i ) eg(v i ) i=0 The egree of a marke FDD f, enote eg(f), equals the egree of the root noe of f. For example, eg(f ) = 5 where f is the marke FDD in Figure 4(a), an eg(f ) = 4 where f is the marke FDD in Figure 4(b). From the above examples, a reuce FDD may have many marke versions, an each marke version may have a ifferent egree. As mentione earlier, the number of simple rules in the firewall of a marke FDD equals the egree of the marke FDD. Thus, it is avantageous, when generating a marke version of a reuce firewall, to generate the marke version with the smallest possible egree. This is achieve by the following algorithm. Algorithm 2: (Marking of FDDs) input : a reuce FDD f output: a marke version f of f such that for every marke version f of f, eg(f ) eg(f ) 1. Compute the egree of each terminal noe v in f as follows: eg(v) = 1 2. while f has a noe v whose egree has not yet been compute an v has k outgoing eges e 0,, e k 1 that are incoming of the noes v 0,, v k 1, respectively, whose egrees have alreay been compute o 6. Firewall Generation In this section, we present an algorithm, Algorithm 3, for generating a firewall of a marke FDD f, which is generate by Algorithm 2 in section 5. The generate firewall is a sequence of rules where each rule correspons to a ecision path in the marke FDD f. Algorithm 3 computes for each rule in the generate firewall a binary number, calle rank of the rule, an two preicates, calle exhibite an original preicates of the rule. The rule ranks are use to orer the compute rules in the generate firewall. The exhibite an original preicates of the rules are use in the next section to make the generate firewall compact. A firewall r over the fiels F 0,, F n 1 is a sequence of rules r 0,, r m 1 where each rule is of the form Each S i is either the mark ALL or a nonempty set of integers taken from the omain of fiel F i (which is an interval of consecutive nonnegative integers). The ecision is either a (for accept) or (for iscar). The last rule, r m 1, in firewall r is of the form: where each S i is either the mark ALL or the entire omain of fiel F i. A packet (p 0,, p n 1 ) over the fiels F 0,, F n 1 is sai to match a rule r i in a firewall over the same fiels iff rule r i is of the form an the preicate (p 0 S 0 p n 1 S n 1 ) hols. A packet over the fiels F 0,, F n 1 is sai to be accepte by a firewall r over the same fiels iff r has a rule r i that satisfies the following three conitions: 1. The packet matches r i. 2. The packet oes not match any rule that precees r i. 3. The ecision of r i is a.

6 Similarly, a packet over the fiels F 0,, F n 1 is sai to be iscare by a firewall r over the same fiels iff r has a rule r i that satisfies the following three conitions: 1. The packet matches r i. 2. The packet oes not match any rule that precees r i. 3. The ecision of r i is. Let r be a firewall over the fiels F 0,, F n 1. The set of all packets accepte by r is enote r.accept, an the set of all packets iscare by r is enote r.iscar. The next theorem follows from these efinitions. Theorem 2 (Theorem of Firewalls) For any over the fiels F 0,, F n 1, 1. r.accept r.iscar =, an 2. r.accept r.iscar = Σ firewall r where is the empty set an Σ is the set of all packets over the fiels F 0,, F n 1. Algorithm 3: (Firewall Generation) input : a marke FDD f over the fiels F 0,, F n 1 an assume that along each irecte path in f, if a fiel F i appears before fiel F j then i < j. output: a firewall r over the same fiels such that r.accept = f.accept, an r.accept = f.accept an for each rule r i in r, the algorithm computes a binary number of n bits, calle the rank of r i, an two preicates, calle the exhibite an original preicates of r i. 1. For each ecision path in f, compute a rule r i, its rank, its exhibite preicate ep i an its original preicate op i as follows: rank = b 0 b n 1 ep i = ( ) op i = (F 0 T 0 F n 1 T n 1 ) where each b i, S i, an T i is compute accoring to the following three cases: Case 1:(The ecision path has no noes labelle F i ) b i = 0 S i =the omain [a i, b i ] of F i T i =the omain [a i, b i ] of F i Case 2:(The ecision path has a noe labelle F i, an its outgoing ege e has no mark) b i = 0 S i =the integer set that labels e T i =the integer set that labels e Case 3:(The ecision path has a noe labelle F i, an its outgoing ege e has an ALL mark) b i = 1 S i =ALL T i =the integer set that labels e 2. After computing all the rules an their ranks, orer the rules in r in an ascening orer of their ranks. As an example, if Algorithm 3 is applie to the marke FDD in Figure 4(b), we obtain the firewall in Figure 5. Associate with each of the three rules in this firewall are a rank, an an exhibite an original preicates. In particular, associate with the first rules are rank =00, exhibite preicate =(F 0 [4, 7] F 1 [2, 3] [5, 7]), original preicate =exhibite preicate. Associate with the secon rule are: rank =01, exhibite preicate =(F 0 [4, 7] F 1 ALL), original preicate =(F 0 [4, 7] F 1 [0, 1] [4, 4] [8, 9]). Associate with the thir rule are: rank =10, exhibite preicate =(F 0 ALL F 1 [0, 9]), original preicate =(F 0 [0, 3] [8, 9] F 1 [0, 9]). Note that the three rules are place in the firewall in ascening orer of their ranks. r = ( F 0 [4, 7] F 1 [2, 3] [5, 7] a, F 0 [4, 7] F 1 ALL, F 0 ALL F 1 [0, 9], ) Figure 5. A generate firewall 7. Firewall Compactness Firewalls that are generate by Algorithm 3 in the last section can have reunant rules, i.e., rules that can be remove from their firewalls without affecting the accept or iscar sets of these firewalls. For example, the secon rule in firewall r in Figure 5 is reunant. Thus, removing this rule from r yiels the equivalent in Figure 6. The two firewalls are equivalent since r.accept = r.accept, an r.accept = r.accept A firewall is calle compact iff it has no reunant rules. It is straightforwar to argue that the firewall in Figure 6 is compact. In this section, we present an algorithm, Algorithm 4, for etecting an removing all reunant rules from the firewalls generate by Algorithm 3. Algorithm 4 is base on the following theorem.

7 r = ( F 0 [4, 7] F 1 [2, 3] [5, 7] a, F 0 ALL F 1 [0, 9], ) Figure 6. A compact firewall Theorem 3 (Reunancy of Firewall Rules) Let (r 0,, r m 1 ) be a firewall over the fiels F 0,, F n 1 generate by Algorithm 3 in the last section. A rule r i in this firewall, i < m 1, is reunant iff for each j, i < j m 1, at least one of the following two conitions hols: 1. ecision of r j = ecision of r i. 2. No packet over the fiels F 0,, F n 1 satisfies the preicate r i.op ( r i+1.ep r j 1.ep) r j.ep where r i.op enotes the original preicate of r i an r j.ep enotes the exhibite preicate of r j. Algorithm 4: (Firewall Compaction) input : a firewall r with m rules (r 0,, r m 1 ) over the fiels F 0,, F n 1 generate by Algorithm 3 output: a compact firewall r such that r.accept = r.accept, an r.accept = r.accept variables i : 0..m 2; j : 0..m; reunant : array [0..m 1] of boolean; np : name of a preicate; 1. reunant[m 1] := false; 2. for i = m 2 to 0 o j := i + 1; let r i.op be name np; reunant[i] := true while reunant[i] j m 1 o if reunant[j] then j := j + 1; else if ( ecision of r i = ecision of r j ) (no packet over the fiels F 0,, F n 1 satisfies np r j.ep) then let np r j.ep be name np; j := j + 1; else reunant[i] := false; 3. Remove from r every rule r i where reunant[i] := true. If we apply Algorithm 4 to the firewall in Figure 5, we obtain the compact firewall in Figure Firewall Simplification A firewall rule of the form is calle simple iff every S i in the rule is either the ALL mark or an interval of consecutive nonnegative integers. A firewall is calle simple off all its rules are simple. The following algorithm can be use to simplify any firewall generate by Algorithm 3 or Algorithm 4. Algorithm 5: (Firewall Simplification) input : a firewall r generate by Algorithm 3 or Algorithm 4 output: a simple firewall r such that r.accept = r.accept, an r.accept = r.accept while r has a rule of the form F 0 S 0 F i S [a, b] F n 1 S n 1 where S is a nonempty set of nonnegative integers that has neither a 1 nor b + 1 o replace this rule by two consecutive rules of the form: F 0 S 0 F i S F n 1 S n 1, F 0 S 0 F i [a, b] F n 1 S n 1 en If we apply Algorithm 5 to the compact firewall r in Figure 6, we obtain the simple firewall r in Figure 7. Note r = ( F 0 [4, 7] F 1 [2, 3] a, F 0 [4, 7] F 1 [5, 7], F 0 ALL F 1 [0, 9], ) Figure 7. A simple firewall that our firewall running example, illustrate in the Figure 2 through 7, starte by the FDD in Figure 2. If we irectly generate an simplifie our firewall from this FDD, ignoring Algorithm 1, 2, an 4, then we woul have ene up with a firewall consists of 14 simple rules. Thus the role of Algorithms 1, 2, an 4 is to reuce the number of simple rules in the final firewall from 14 to mere 3. A big saving! 9. Summary of Firewall Design It is useful to summarize our firewall esign metho in this section, Figure 8 shows the ifferent steps of our fire-

8 wall esign metho. PSfrag replacements Algorithm 6 A user specifie FDD f Algorithm 1 A reuce FDD f Algorithm 2 A marke FDD f Algorithm 3 A generate firewall r Algorithm 4 A compact firewall r Algorithm 5 A simple firewall r Figure 8. Steps of our firewall esign metho The metho starts by some user specifying an FDD f. The consistency an completeness properties of f can be verifie systematically, possibly using a computer program. Although f guarantees that the final firewall is both consistent an complete, f shoul not be use to irectly generate an simplify this final firewall (otherwise, the number of simple rules in the final firewall woul be very large). Instea, f is first reuce (using Algorithm 1), an some of its eges are marke with the ALL mark (using Algorithm 2), then the firewall is generate from the marke FDD (using Algorithm 3). Note that although marking some of the eges in an FDD introuces conflicts into the FDD, the marking algorithm, Algorithm 3, maintains the consistency an completeness conitions of the original FDD. Unfortunately, the generate firewall can still have some reunant rules (even though this firewall is generate after applying the reuction algorithm, Algorithm 1, go get ri of many reunant rules). Thus, Algorithm 4 is use to etect an remove all the remaining reunant rules from the generate firewall. Finally, Algorithm 5 is use to simplify the rules in the generate firewall. Note that the marking algorithm, Algorithm 2, guarantees that the number of simple rules in the generate firewall is kept to a minimum. 10. Concluing Remarks Our contribution in this paper is two-fol. First, we propose to use firewall ecision iagrams to specify firewalls at the early stage of firewall esign. The main avantages of these iagrams is that their consistency an completeness can be checke systematically. Secon, we evelope a sequence of five algorithms that can be applie to a firewall ecision iagram to generate a compact sequence of firewall rules while maintaining the consistency an completeness of the original firewall iagram. In our firewall esign metho, we assume that to each encountere packet, a firewall assigns one of two ecisions: accept or iscar. Nevertheless, this esign metho can be easily extene to allow a firewall to select one of any number ecisions. For example, the extene metho can be use to esign a firewall that assigns to each encountere packet a ecision taken from the following four ecisions: accept, accept-an-log, iscar, an iscar-an-log. The esign metho iscusse in this paper is not restricte to esigning firewalls. Rather, this metho can also be applie to the esign of general packet classifiers. References [1] High level firewall language, [2] F. Baboescu an G. Varghese. Fast an scalable conflict etection for packet classifiers. In Proc. of the 10th IEEE International Conference on Network Protocols, [3] Y. Bartal, A. J. Mayer, K. Nissim, an A. Wool. Firmato: A novel firewall management toolkit. In Proc. of IEEE Symp. on Security an Privacy, pages 17 31, [4] A. Begel, S. McCanne, an S. L. Graham. BPF+: Exploiting global ata-flow optimization in a generalize packet filter architecture. In Proc. of ACM SIGCOMM 99, [5] R. E. Bryant. Graph-base algorithms for boolean function manipulation. IEEE Trans. on Computers, 35(8): , [6] M. M. Buhikot, S. Suri, an M. Walvogel. Space ecomposition techniques for fast Layer-4 switching. In Proc. of PHSN, Aug [7] D. Eppstein an S. Muthukrishnan. Internet packet filter management an rectangle geometry. In Symp. on Discrete Algorithms, pages , [8] A. Felmann an S. Muthukrishnan. Traeoffs for packet classification. In Proc. of 19th IEEE INFOCOM, Mar [9] P. Gupta an N. McKeown. Algorithms for packet classification. IEEE Network, 15(2):24 32, [10] J. D. Guttman. Filtering postures: Local enforcement for global policies. In Proc. of IEEE Symp. on Security an Privacy, pages , [11] A. Hari, S. Suri, an G. M. Parulkar. Detecting an resolving packet filter conflicts. In Proc. of IEEE Infocom, pages , [12] V. Srinivasan, G. Varghese, S. Suri, an M. Walvogel. Fast an scalable layer four switching. In Proc. of ACM SIG- COMM, pages , [13] K. Strehl an L. Thiele. Interval iagrams for efficient symbolic verification of process networks. IEEE Trans. on Computer-Aie Design of Integrate Circuits an Systems, 19(8): , 2000.

Structured Firewall Design

Structured Firewall Design Structured Firewall Design Mohamed G. Gouda and Alex X. Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-0233, U.S.A. {gouda, alex}@cs.utexas.edu Abstract. A firewall

More information

Firewall Design: Consistency, Completeness, Compactness

Firewall Design: Consistency, Completeness, Compactness Firewall Design: Consistency, Completeness, Compactness Alex X. Liu alex@cs.utexas.edu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, U.S.A. March, 2004 Co-author:

More information

How To Design A Firewall As A Sequence Of Rules

How To Design A Firewall As A Sequence Of Rules Computer Networks 51 (2007) 1106 1120 www.elsevier.com/locate/comnet Structured firewall design q Mohamed G. Gouda, Alex X. Liu * Department of Computer Sciences, The University of Texas at Austin, Austin,

More information

Firewall Queries. Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu 2 Department of Computer Science, Texas State University,

Firewall Queries. Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu 2 Department of Computer Science, Texas State University, Firewall Queries Alex X. Liu 1, Mohamed G. Gouda 1, Huibo H. Ma 2, Anne HH. Ngu 2 1 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

Complete Redundancy Detection in Firewalls

Complete Redundancy Detection in Firewalls Complete Redundancy Detection in Firewalls Alex X. Liu and Mohamed G. Gouda Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, USA {alex, gouda}@cs.utexas.edu

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

A Model of Stateful Firewalls and its Properties

A Model of Stateful Firewalls and its Properties A Model of Stateful Firewalls and its Properties Mohamed G. Gouda and Alex X. Liu 1 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-1188, U.S.A. Email: {gouda, alex}@cs.utexas.edu

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 Efficient Packet Filtering for Stateful Firewall using the Geometric Efficient Matching Algorithm. Shriya.A.

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Optimization of Firewall Filtering Rules by a Thorough Rewriting

Optimization of Firewall Filtering Rules by a Thorough Rewriting LANOMS 2005-4th Latin American Network Operations and Management Symposium 77 Optimization of Firewall Filtering Rules by a Thorough Rewriting Yi Zhang 1 Yong Zhang 2 and Weinong Wang 3 1, 2, 3 Department

More information

Firewall Policy Change-Impact Analysis

Firewall Policy Change-Impact Analysis 15 Firewall Policy Change-Impact Analysis ALEX X LIU, Michigan State University Firewalls are the cornerstones of the security infrastructure for most enterprises They have been widely deployed for protecting

More information

FIREWALL POLICY ADVISOR FOR ANOMALY DISCOVERY AND RULE EDITING

FIREWALL POLICY ADVISOR FOR ANOMALY DISCOVERY AND RULE EDITING FIREWALL POLICY ADVISOR FOR ANOMALY DISCOVERY AND RULE EDITING Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH OLIVIER BERNARDI AND ÉRIC FUSY Abstract. This article presents unifie bijective constructions for planar maps, with control on the face egrees

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

Reducing the Size of Rule Set in a Firewall

Reducing the Size of Rule Set in a Firewall Reducing the Size of Rule Set in a Firewall MyungKeun Yoon Shigang Chen Zhan Zhang Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA 352 392 2713

More information

SCADA (Supervisory Control and Data Acquisition) systems

SCADA (Supervisory Control and Data Acquisition) systems Proceeings of the 2013 Feerate Conference on Computer Science an Information Systems pp. 1423 1428 Improving security in SCADA systems through firewall policy analysis Onrej Rysavy Jaroslav Rab Miroslav

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

Change-Impact Analysis of Firewall Policies

Change-Impact Analysis of Firewall Policies Change-Impact Analysis of Firewall Policies Alex X. Liu Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824-1266, U.S.A alexliu@cse.msu.edu Abstract. Firewalls

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, bli@eecg.toronto.eu Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information

Verification of Computing Policies and Other Hard Problems

Verification of Computing Policies and Other Hard Problems Verification of Computing Policies and Other Hard Problems Mohamed G Gouda University of Texas at Austin gouda@cs.utexas.edu Presentation at METIS-2014 1 Computing Policy A computing policy is a formalism

More information

Efficiently Managing Firewall Conflicting Policies

Efficiently Managing Firewall Conflicting Policies Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

Security Vulnerabilities and Solutions for Packet Sampling

Security Vulnerabilities and Solutions for Packet Sampling Security Vulnerabilities an Solutions for Packet Sampling Sharon Golberg an Jennifer Rexfor Princeton University, Princeton, NJ, USA 08544 {golbe, jrex}@princeton.eu Abstract Packet sampling supports a

More information

Which Networks Are Least Susceptible to Cascading Failures?

Which Networks Are Least Susceptible to Cascading Failures? Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is

More information

II. BASICS OF PACKET FILTERING

II. BASICS OF PACKET FILTERING Use of Formal models for the Firewall Policy Optimization ShatanandPatil* and B. B. Meshram** *(Department of Computer Technology, Veermata Jijabai Technical Institute, Mumbai 19) *(Department of Computer

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14.

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14. 7 Shocks Reaing: Ryen chs 3 & 4, Shu chs 5 & 6 For the enthusiasts, Shu chs 3 & 4 A goo article for further reaing: Shull & Draine, The physics of interstellar shock waves, in Interstellar processes; Proceeings

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

www.kickstartcommerce.com

www.kickstartcommerce.com Using Google Webmaster Tools to Verify an Submit a Website Sitemap Kickstart Commerce Generate greater customer an revenue growth. www.kickstartcommerce.com Open a web browser, an type in or copy an paste

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications 00 CHAPTER 5 Differential Equations SECTION 5. First-Orer Linear Differential Equations First-Orer Linear Differential Equations Bernoulli Equations Applications First-Orer Linear Differential Equations

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

Net Neutrality, Network Capacity, and Innovation at the Edges

Net Neutrality, Network Capacity, and Innovation at the Edges Net Neutrality, Network Capacity, an Innovation at the Eges Jay Pil Choi Doh-Shin Jeon Byung-Cheol Kim May 22, 2015 Abstract We stuy how net neutrality regulations affect a high-banwith content provier(cp)

More information

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT International Journal of Avance Research in Computer Engineering & Technology (IJARCET) HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT Pawan Kumar, Pijush Kanti Dutta Pramanik Computer Science

More information

Author's personal copy. Computer Networks 53 (2009) 2800 2809. Contents lists available at ScienceDirect. Computer Networks

Author's personal copy. Computer Networks 53 (2009) 2800 2809. Contents lists available at ScienceDirect. Computer Networks Computer Networks 53 (2009) 2800 2809 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet Firewall policy verification and troubleshooting Alex

More information

SERVING as the first line of defense against malicious

SERVING as the first line of defense against malicious IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. X, XXX 2009 1 Firewall Policy Queries Alex X. Liu, Member, IEEE, and Mohamed G. Gouda, Member, IEEE Abstract Firewalls are crucial elements

More information

GeTec Ingenieurgesellschaft für Informations- und Planungstechnologie mbh. www.getec-ac.de. Presented by

GeTec Ingenieurgesellschaft für Informations- und Planungstechnologie mbh. www.getec-ac.de. Presented by The Design of vibro replacement Dipl.-Ing. Heinz J. Priebe Presente by GeTec Ingenieurgesellschaft für Informations- un Planungstechnologie mbh Rhein-Main Office +49 69 800 6624 Fax +49 69 800 4977 Aachen

More information

Rural Development Tools: What Are They and Where Do You Use Them?

Rural Development Tools: What Are They and Where Do You Use Them? Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist -fisher@tamu.eu Juith I. Stallmann

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES

DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES DECISION SUPPORT SYSTEM OR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES Svetlana Vinnik 1, Marc H. Scholl 2 Abstract Decision-making in the fiel of acaemic planning involves extensive analysis

More information

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes F A C U L T Y O F S C I E N C E U N I V E R S I T Y O F C O P E N H A G E N Department of Mathematical Sciences, University of Copenhagen Kaniat projekt i matematik Jens Jakob Kjær Golo Complexes Avisor:

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Safety Stock or Excess Capacity: Trade-offs under Supply Risk Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain achaturvei@iese.eu

More information

A Scheme to Estimate One-way Delay Variations for Diagnosing Network Traffic Conditions

A Scheme to Estimate One-way Delay Variations for Diagnosing Network Traffic Conditions Cyber Journals: Multiisciplinary Journals in Science an Technology Journal of Selecte Areas in Telecommunications (JSAT) August Eition 2011 A Scheme to Estimate One-way Delay Variations for Diagnosing

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

Improving Emulation Throughput for Multi-Project SoC Designs

Improving Emulation Throughput for Multi-Project SoC Designs Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest

More information

Firewall Compressor: An Algorithm for Minimizing Firewall Policies

Firewall Compressor: An Algorithm for Minimizing Firewall Policies Firewall Compressor: An Algorithm for Minimizing Firewall Policies Alex X. Liu Eric Torng Chad R. Meiners Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824,

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

How To Connect Two Servers Together In A Data Center Network

How To Connect Two Servers Together In A Data Center Network DPillar: Scalable Dual-Port Server Interconnection for Data Center Networks Yong Liao ECE Department University of Massachusetts Amherst, MA 3, USA Dong Yin Automation Department Northwestern Polytech

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM)

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM) Trace P Packets by Flexible Deterministic Packet Marking (F) Yang Xiang an Wanlei Zhou School of nformation Technology Deakin University Melbourne, Australia {yxi, wanlei}@eakin.eu.au Abstract- Currently

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence Seeing the Unseen: Revealing Mobile Malware Hien Communications via Energy Consumption an Artificial Intelligence Luca Caviglione, Mauro Gaggero, Jean-François Lalane, Wojciech Mazurczyk, Marcin Urbanski

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Simplified Modelling and Control of a Synchronous Machine with Variable Speed Six Step Drive

Simplified Modelling and Control of a Synchronous Machine with Variable Speed Six Step Drive Simplifie Moelling an Control of a Synchronous Machine with Variable Spee Six Step Drive Matthew K. Senesky, Perry Tsao,Seth.Saners Dept. of Electrical Engineering an Computer Science, University of California,

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks arxiv:.795v [cs.gt] 8 Feb Tian Zhang, Wei Chen, Zhu Han, an Zhigang Cao State Key Laboratory on Microwave an Digital

More information

Definition of the spin current: The angular spin current and its physical consequences

Definition of the spin current: The angular spin current and its physical consequences Definition of the spin current: The angular spin current an its physical consequences Qing-feng Sun 1, * an X. C. Xie 2,3 1 Beijing National Lab for Conense Matter Physics an Institute of Physics, Chinese

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis iqui Pricing for Digital Infrastructure Services Subhajyoti Banyopahyay * an sing Kenneth Cheng Department of Decision an Information Sciences Warrington College of Business Aministration University of

More information

Pythagorean Triples Over Gaussian Integers

Pythagorean Triples Over Gaussian Integers International Journal of Algebra, Vol. 6, 01, no., 55-64 Pythagorean Triples Over Gaussian Integers Cheranoot Somboonkulavui 1 Department of Mathematics, Faculty of Science Chulalongkorn University Bangkok

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit Mehra@isb.eu ABSTRACT Web site aresses of small on line retailers are often unknown

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

An MTIDD Based Firewall

An MTIDD Based Firewall Telecommunication Systems 27:2 4, 297 319, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. An MTIDD Based Firewall Using Decision Diagrams for Packet Filtering MIKKEL CHRISTIANSEN

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by, Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent

More information

Supporting Adaptive Workflows in Advanced Application Environments

Supporting Adaptive Workflows in Advanced Application Environments Supporting aptive Workflows in vance pplication Environments Manfre Reichert, lemens Hensinger, Peter Daam Department Databases an Information Systems University of Ulm, D-89069 Ulm, Germany Email: {reichert,

More information

Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar

Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Aalborg Universitet Heat-An-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Publishe in: International Journal of Heat an Mass Transfer

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Low-Complexity an Distribute Energy inimization in ulti-hop Wireless Networks Longbi Lin, Xiaojun Lin, an Ness B. Shroff Center for Wireless Systems an Applications (CWSA) School of Electrical an Computer

More information