Firewall Modules and Modular Firewalls

Size: px
Start display at page:

Download "Firewall Modules and Modular Firewalls"

Transcription

1 Firewall Modules ad Modular Firewalls H. B. Acharya Uiversity of Texas at Austi Aditya Joshi Uiversity of Texas at Austi M. G. Gouda Natioal Sciece Foudatio Abstract A firewall is a packet filter placed at a etry poit of a etwork i the Iteret. Each packet that goes through this etry poit is checked by the firewall to determie whether to accept or discard the packet. The firewall makes this determiatio based o a specified sequece of overlappig rules. The firewall uses the first-match criterio to determie which rule i the sequece should be applied to which packet. Thus, to compute the set of packets to which a rule is applied, the firewall desiger eeds to cosider all the rules that precede this rule i the sequece. This rule depedecy complicates the task of desigig firewalls (especially those with thousads of rules), ad makes firewalls hard to uderstad. I this paper, we preset a metric, called the depedecy metric, for measurig the complexity of firewalls. This metric, though accurate, does ot seem to suggest ways to desig firewalls whose depedecy metrics are small. Thus, we preset aother metric, called the iversio metric, ad develop methods for desigig firewalls with small iversio metrics. We show that the depedecy metric ad the iversio metric are correlated for some classes of firewalls. So by aimig to desig firewalls with small iversio metrics, the desiger may ed up with firewalls whose depedecy metrics are small as well. We preset a method for desigig modular firewalls whose iversio metrics are very small. Each modular firewall cosists of several compoets, called firewall modules. The iversio metric of each firewall module is very small - i fact, 1 or 2. Thus, we coclude that modular firewalls are easy to desig ad easy to uderstad. I. INTRODUCTION A firewall is a packet filter that is placed at a etry poit of a etwork i the Iteret. The fuctio of a firewall is to check each packet that goes through the etry poit (at which the firewall is located) ad determie whether to accept the packet ad allow it to proceed o its way or to discard the packet. The firewall perform its fuctio based o a specified sequece of rules. Each rule is of the form < predicate > < decisio > where < predicate > is a fuctio that assigs to each packet a boolea value, true or false, ad < decisio > is either accept or discard. Whe a packet p reaches a firewall F, F performs two steps: 1) F idetifies the first rule r (i its sequece of rules) whose < predicate > assigs the value true to packet p. 2) If the < decisio > of rule r is accept (or discard, respectively) the F accepts (or discards, respectively) packet p. Note that F employs a first-match criterio to determie which rule (i its sequece of rules) should be applied to which packet. This first-match criterio allows the rules i the rule sequece to be overlappig. This ca be both advatageous ad disadvatageous. The advatage of makig the rules i the rule sequece overlappig is that it reduces the umber of rules i the rule sequece, sometimes dramatically. The disadvatage of makig the rules i the rule sequece overlappig is that it creates may depedecies betwee the rules i the rule sequece. This, i tur, complicates the task of desigig ad uderstadig the rule sequece. For istace, if the firewall desiger eeds to compute the set of packets to which a rule r (i the rule sequece) applies, the the desiger eeds to cosider ot oly rule r but also all the rules that precede r i the rule sequece. I this paper, we itroduce a metric, called the depedecy metric, that measures the complexity of firewalls. The more the value of the metric for a give firewall, the more complex the firewall is ad the harder it is to desig ad uderstad. Ufortuately, the depedecy metric, though accurate, does ot seem to suggest methods for desigig firewalls for which the values of the metric are small. Thus, we itroduce aother complexity metric, called the iversio metric, for measurig the complexity of firewalls. We show, below, that the depedecy metric ad the iversio metric are correlated (at least for a rich class of firewalls called uiform firewalls ). This result allows us to use the iversio metric as a good approximatio of the depedecy metric. The, we idetify three classes of firewalls, amely simple firewalls, partitioed firewalls, ad modular firewalls, for which the values of the iversio metric are small. (This implies that these classes of firewalls are easier to desig ad uderstad.) We also describe methods for desigig firewalls i these three classes. Of particular iterest is the class of modular firewalls. Each modular firewall cosists of simple firewall compoets, called firewall modules. The value of the iversio metric for each firewall module is 1 or 2. This causes the value of the iversio metric for the full firewall to be 1 or 2. (Note that the smallest possible value of the iversio metric is 1.) We preset a algorithm that takes as iput ay firewall F whose iversio metric is large ad computes as output a equivalet modular firewall MF whose iversio metric is (by defiitio) 1 or 2. The complexity of this algorithm is O( 2 )

2 where is the umber of rules i the iput firewall F. The existece of this algorithm idicates that desigig a modular firewall is ot harder tha desigig a equivalet o-modular firewall. Our simulatio results, reported below, show that the cost ad performace of this algorithm are attractive. II. FIELDS, PACKETS, RULES, AND FIREWALLS I this sectio, we defie the mai terms i this paper - fields, packets, rules, ad firewalls. A field is a variable, whose value is take from a iterval of o-egative itegers. Examples of fields are source IP address, destiatio IP address, trasport protocol, source port umber, ad destiatio port umber. The domai of values of the source IP address field, for example, is the iterval [0, ]. I this paper, we cosider d fields, deoted f 1,.., ad f d. The domai of values of each field f j, deoted D(f j ), is a iterval of o-egative itegers. A packet p is a d-tuple (p.f 1,.., p.f d ), where each p.f j is a elemet from the domai D(f j ) of field f j. A rule r is of the form: f 1 R 1... f d R d < r.decisio > where each R j is a o-empty iterval of o-egative itegers take from the domai D(f j ) of field f j, ad the < r.decisio > is either accept or discard. A rule whose decisio is accept is called a accept rule, ad a rule whose decisio is discard is called a discard rule. A packet (p.f 1,.., p.f d ) is said to match a rule r of the form: f 1 R 1... f d R d < r.decisio > iff the predicate (p.f 1 R 1... p.f d R d ) holds. A rule of the form f 1 D(f 1 )... f d D(f d ) accept is called a accept-all rule, ad a rule of the form f 1 D(f 1 )... f d D(f d ) discard is called a discard-all rule. A firewall F is a oempty sequece of rules, where the last rule is either a accept-all rule or a discard all rule. A packet (p.f 1,.., p.f d ) is said to be accepted by a firewall F iff F has a accept rule r such that the followig two coditios hold. 1) (p.f 1,.., p.f d ) matches r. 2) (p.f 1,.., p.f d ) does ot match ay rule that precedes r i F. A packet (p.f 1,.., p.f d ) is said to be discarded by a firewall F iff F has a discard rule r such that the followig two coditios hold. 1) (p.f 1,.., p.f d ) matches r. 2) (p.f 1,.., p.f d ) does ot match ay rule that precedes r i F. Because the last rule i a firewall is either a accept-all rule or a discard-all rule, it is straightforward to show that for every packet ad every firewall F, either the packet is accepted by F or the packet is discarded by F. Two firewalls F ad G are said to be equivalet iff F ad G accept the same set of packets (ad discard the same set of packets). III. THE DEPENDENCY METRIC OF FIREWALLS I this sectio we defie a metric that ca be used to measure the complexity of a firewall. If the value of this metric is large for oe firewall, the this firewall is relatively hard to uderstad. Ad if the value of this metric is small for aother firewall, the this firewall is relatively easy to uderstad. We refer to this metric as the depedecy metric. But before we ca defie the depedecy metric, we first eed to itroduce several defiitios. A bad of a firewall F is a maximal sequece of cosecutive rules that have the same decisio, whether accept or discard, i F. If (all) the rules i a bad have accept decisios, the the bad is called a accept bad. Similarly, if (all) the rules i a bad have discard decisios, the the bad is called a discard bad. Theorem 1. If the rules i a bad i a firewall F are reordered i ay way, the the resultig firewall is equivalet to F. Proof: Assume that the rules i a bad B i F are reordered i ay way. Let p be a packet that is resolved by a rule r i B before the reorder. Ad assume that packet p is resolved by aother rule s after the reorder. Thus, rule s belogs to bad B, ad has moved ahead of rule r as a result of the reorder. Because both rules r ad s belog to the same bad B, they have the same decisio. Therefore, rule s will resolve packet p after the reorder i the same way that rule r has resolved packet p before the reorder. Every packet that is accepted before the reorder is also accepted after the reorder, ad every packet that is discarded before the reorder is also discarded after the reorder. Hece the firewall that results from the reorder is equivalet to the origial firewall F before the reorder. If all the rules i a firewall have the same decisio, the this firewall cosists of oly oe bad. But such a firewall is ot very useful i practice. Thus, from ow o, we cosider oly firewalls that cosist of two or more bads. A packet p is said to be resolved by a rule r i a firewall F iff the followig two coditios hold: 1) p matches rule r. 2) p does ot match ay rule s, where s precedes r i F ad r ad s occur i differet bads i F. The depedecy set of a rule r i a firewall F is the set cotaiig every rule s, where s precedes r i F, ad r ad s occur i differet bads i F. From the last two defiitios, we coclude that to determie whether a packet p is resolved by a rule r i a firewall F, oe eeds to test packet p agaist rule r ad agaist every rule i

3 the depedecy set of r. Clearly, the complexity of these tests are proportioal to the umber of rules i the depedecy set of r. If the cardiality of the depedecy set of r is large, the determiig whether a give packet is resolved by r is relatively hard. Ad oe ca claim, i this case, that rule r is hard to uderstad. O the other had, if the cardiality of the depedecy set of r is small, the determiig whether a give packet is resolved by r is relatively easy. Ad oe ca claim, i this case, that rule r is easy to uderstad. It follows from this discussio that the complexity of uderstadig a rule r i a firewall F ca be measured by the cardiality of the depedecy set of r i F. Therefore, the complexity of uderstadig firewall F ca be measured by the average cardiality of a depedecy set of a rule i F. The depedecy metric of a firewall F is the average cardiality of a depedecy set of a rule i F. Theorem 2. Let F be ay firewall that has rules. 1) The smallest possible value of the depedecy metric of F is ( 1). 2) The largest possible value of the depedecy metric of F is ( 1) 2. Proof: 1) The depedecy metric of F has its smallest value whe F cosists of oly two bads. The first bad cosists of the top 1 rules i F, ad the secod bad cosists of the last rule i F. I this case, the depedecy set of each oe of the top 1 rules is empty, ad the depedecy set of the last rule has 1 rules. Thus, the average cardiality of a depedecy set of a rule i F is 1. 2) The depedecy metric of F has its largest value whe F cosists of bads. Ad each bad cosists of oly oe rule. I this case, the depedecy set of the first rule i F has 0 rules, the depedecy set of the secod rule i F has 1 rule,..., the depedecy set of the -th rule i F has 1 rules. Thus, the average cardiality of a depedecy set of a rule i F is 1 2. The problem of the depedecy metric is that this metric does ot seem to suggest methods for desigig firewalls whose depedecy metrics are small. This problem compels us to look for aother complexity metric of firewalls. This ew complexity metric eeds to satisfy two requiremets. First, this ew metric eeds to be correlated to the depedecy metric (at least for some classes of firewalls). Secod, it should be easy to desig firewalls for which the ew metric has a small value. We preset such a metric i the ext sectio. IV. THE INVERSION METRIC OF FIREWALLS I this sectio we itroduce a secod metric that ca be used to measure the complexity of firewalls. We refer to this metric as the iversio metric. We show that the iversio metric satisfies two ice properties. First, we show, i this sectio, that the value of the iversio metric of a firewall is correlated to the value of the depedecy metric of the same firewall (whe the firewall is uiform). This result allows us to use the iversio metric as a good approximatio of the depedecy metric. Secod, we demostrate, i Sectio 7 below, that oe ca develop methods for desigig firewalls whose iversio metrics are very small. I particular, we give a algorithm that takes as iput ay firewall, whose iversio metric value is large, ad produces a equivalet firewall, whose iversio metric value is o more tha 2, a small value. The iversio metric of a firewall F is the umber of pairs of adjacet rules that have differet decisios i F. Theorem 3. Let F be a firewall that has rules. 1) The smallest possible value of the iversio metric of F is 1. 2) The largest possible value of the iversio metric of F is 1. Proof: Because, as metioed i Sectio 3, we cosider oly firewalls that have two or more bads, the smallest possible value of the iversio metric of a firewall is 1. Also, for a firewall that has rules, the largest possible value of the iversio metric is 1. A firewall F is called uiform iff each bad i F has the same umber of rules. Thus, if a uiform firewall F has rules ad k bads, the each bad i F has k rules. Theorem 4. Let F be a uiform firewall that has rules. Also, let dm be the value of the depedecy metric of F, ad im be the value of the iversio metric of F. dm = im 2 (im + 1) Proof: Sice im is the iversio metric of firewall F, F has im + 1 bads, ad because F is uiform, each bad i F has im+1 rules. The cardiality of the depedecy set of each rule i the i-th bad i F, where i is i the rage 1..(im+1), is (i 1) (im+1). Thus, the average cardiality dm of the depedecy set of a rule i F ca be computed as follows: dm = im+1 i=1 im+1 (i 1) im+1 im+1 = (im + 1) 2 i 1 i=1 im = (im + 1) 2 i i=0 im (im + 1) = (im + 1) 2 2 im = 2 (im + 1)

4 This theorem shows that whe the value of the iversio metric im (of a uiform firewall) is 1, the value of the depedecy metric dm (of the same firewall) is ( 1)/2. Both these values are the largest possible values for their metrics. Also, whe the value of the iversio metric im is reduced to 1, the value of the depedecy metric is reduced to /4. Both these values are small values for their metrics. I other words, there is some correlatio betwee the value of the iversio metric im ad the value of the depedecy metric dm. Thus oe ca use the iversio metric (which is easy to deal with) as a good approximatio of the depedecy metric (which is hard to deal with). I the ext two sectios, we preset two classes of firewalls, amely simple firewalls ad partitioed firewalls, whose iversio metrics are small. V. SIMPLE FIREWALLS A firewall F is called simple iff F is a sequece of three bads, B 0 followed by B 1 followed by B 2, such that the followig three coditios are satisfied: 1) Bad B 0 cosists of zero or more discard rules. (Note that if B 0 has zero discard rules, the bad B 0 does ot exist i F ad, i this case, F is a sequece of oly two bads, B 1 followed by B 2.) 2) Bad B 1 cosists of oe or more accept rules. 3) Bad B 2 cosists of oly oe discard-all rule. Simple firewalls are iterestig because the values of their iversio metrics are small (ad so they are easy to uderstad) as follows. If bad B 0 exists i a simple firewall F, the the iversio metric of F is 2. Otherwise, the iversio metric of F is 1. Below we describe how to idetify irrelevat rules i ay simple firewall F ad argue that removig these rules from F yields a firewall G that is both equivalet to F ad simple. But first we eed to preset some defiitios. Let F be a simple firewall ad let r ad s be two distict rules i F where r : f 1 R 1.. f d R d < r.decisio > s : f 1 S 1.. f d S d < s.decisio > Rule r is said to cover rule s iff every iterval R j i r cotais the correspodig iterval S j i s. Rule r is said to overlap rule s iff every itersectio of a iterval R j i r with the correspodig iterval S j i s is oempty. Rule s is called irrelevat i the simple firewall F iff s satisfies the followig three coditios (Recall that, sice F is simple, F is a sequece of three bads, B 0 followed by B 1, followed by B 2 ): 1) Rule s is i bad B 0 ad there is aother rule r i B 0 where r covers s. 2) Rule s is i bad B 0 ad there is o rule r i B 1 where r overlaps s. 3) Rule s is i bad B 1 ad there is aother rule r i B 1 where r covers s. Now we argue that if a irrelevat rule s is removed from its simple firewall F, the ay packet that could have bee resolved (i.e., accepted or discarded) by rule s ca still be resolved i the same way after s is removed. Because the removed rule s is irrelevat, rule s must have satisfied oe of three coditios 1, 2, or 3 (i the above defiitio), before it is removed. First, if s satisfied coditio 1 before it is removed, the ay packet that is discarded by s, before s is removed, will still be discarded at least by rule r, after s is removed. Secod, if s satisfied coditio 2 before it is removed, the ay packet that is discarded by s, before s is removed, will still be discarded at least by the discard-all rule i F, after s is removed. Third, if s satisfied coditio 3 before it is removed, the ay packet that is accepted by s, before s is removed, will still be accepted at least by rule r, after s is removed. The algorithm for removig irrelevat rules from ay simple firewall is detailed i Algorithm 1. Note that the time complexity for executig Algorithm 1 is O( 2 ), where is the umber of rules i the iput firewall F. Algorithm 1 Removig Irrelevat Rules Iput: A simple firewall F that is a sequece of three bads B 0 followed by B 1 followed by B 2 Output: A simple firewall G that is equivalet to F ad has o irrelevat rules for every rule r i B 0 do if there is aother rule s i B 0 such that r covers s or there is o rule s i B 1 such that r overlaps s the Remove rule r from B 0 ed if ed for for every rule r i B 1 do if there is aother rule s i B 1 such that r covers s the the remove rule r from B 1 ed if ed for The remaiig firewall is G VI. PARTITIONED FIREWALLS A partitioed firewall P F is a oempty set {P F 1,.., P F r } of firewalls, such that the followig oeess coditio holds. Every packet is accepted by at most oe firewall, say P F k, i P F. If a packet is accepted by oe (ad so oly oe) firewall i a partitioed firewall P F, the this packet is said to be accepted by P F. Otherwise, the packet is discarded by every firewall i P F ad, i this case, the packet is said to be discarded by P F. If a partitioed firewall P F is the set {P F 1,.., P F r }, the each firewall P F k i this set is called a compoet of the partitioed firewall P F.

5 Note that oe ca view a moolithic firewall F as a partitioed firewall that cosists of oly oe compoet F. A moolithic firewall F ad a partitioed firewall P F are said to be equivalet iff F ad P F accept the same set of packets (ad discard the same set of packets). There are three advatages of partitioed firewalls over moolithic oes: (a) Parallel processig of packets (b) Ease of desig ad update (c) Small iversio metrics We discuss these three advatages, oe by oe, i order. A. Parallel Processig of Packets Each compoet P F k of a partitioed firewall P F ca be implemeted as a distict thread [1] that is executed o a distict core i a multicore architecture [2]. Whe a packet p arrives at the multicore architecture hostig the partitioed firewall P F, a copy of p is forwarded to each core, as show i Figure 1. Each core the proceeds idepedetly to determie whether or ot to accept packet p ad allow it to proceed. Fig. 1. Parallel Processig of Packets Note that each core makes its determiatio (of whether or ot to accept its copy of p) idepedetly from the determiatios made by the other cores. I other words, the cores do ot eed to sychroize i ay way, ad yet, thaks to oeess coditio, at most oe copy of packet p is accepted ad allowed to proceed by oe core while all the other copies of p are discarded by the other cores. As show i our experimetal results below, this multicore architecture of a partitioed firewall ca process up to 2.5 times as may packets per secod as the traditioal oe core architecture of a moolithic firewall. B. Ease of Desig ad Update A partitioed firewall {P F 1,.., P F r } ca be desiged i two steps as follows. 1) The set of all packets is partitioed ito r ooverlappig classes: P C 1,.., P C r. 2) Each compoet P F k i the partitioed firewall is desiged to accept some (or all) of the packets that belog to the packet class P C k. As a example, assume that we wish to desig a partitioed firewall with five compoets P F 1 through P F 5. First, we partitio the set of all packets ito the five overlappig classes P C 1 through P C 5 : P C 1 : All outgoig packets P C 2 : All icomig, TCP, packets P C 3 : All icomig, TCP, web packets P C 4 : All icomig, TCP packets that are either or web. P C 5 : All icomig, o-tcp packets Secod, each firewall compoet P F k is desiged to accept oly some (or all) of the packets that belog to the correspodig packet class P C k. For istace, P F 1 is desiged to accept oly some (or all) of the outgoig packets, ad so o. I other words, oce the packet classes are all idetified, the firewall compoets ca be desiged idepedetly of oe aother. This makes the desig of a partitioed firewall easier tha that of a moolithic firewall. Moreover, because each firewall compoet P F k is desiged to accept oly some (or all) of the packets that belog to the packet class P C k, oly compoet P F k eeds to be updated wheever the set of accepted packets, that belog to the packet class P C k, eeds to be updated. I other words, ay update of a partitioed firewall ca be realized by updatig oly oe compoet i the firewall. This makes the update of a partitioed firewall easier tha that of a moolithic oe. C. Small Iversio Metric The iversio metric of a partitioed firewall {P F 1,.., P F r } is the value (MAX over k, k is i the rage 1..r, im.k) where each im.k deotes the iversio metric of the firewall compoet P F k. Because the iversio metric of a partitioed firewall is the maximum, rather tha say the sum, of the iversio metrics of the firewall compoets, the iversio metric of a partitioed firewall teds to be smaller tha the iversio metric of a equivalet moolithic firewall. I other words, uderstadig a partitioed firewall teds to be easier tha uderstadig a equivalet moolithic firewall. We ed this sectio by statig (ad verifyig) a sufficiet coditio for esurig that two moolithic firewalls ca be compoets i the same partitioed firewall. Theorem 5. Let F ad G be two (moolithic) firewalls. If for every accept rule r i F ad every accept rule s i G, r does ot overlap s, the F ad G ca be compoets i the same partitioed firewall. Proof: Assume that for every accept rule r i F ad every accept rule s i G, r does ot overlap s. Thus, for every accept rule r i F ad every accept rule s i G, there is o packet that matches both r ad s. I other words, the set of packets that match accept rules i F is disjoit from the set of packets that match accept rules i G. Moreover, because the set of packets that are accepted by a firewall is a subset of the set of packets

6 that match accept rules i the firewall, we coclude that the set of packets that are accepted by F is disjoit from the set of packets that are accepted by G. Therefore F ad G satisfy the oeess coditio ad they ca be firewall compoets i the same partitioed firewall. Note that ay two compoets of a partitioed firewall, that is desiged usig the method outlied at the begiig of this sectio, do satisfy the sufficiet coditio i Theorem 4. VII. MODULAR FIREWALLS I the previous two sectios, we preseted two classes of firewalls, amely simple firewalls ad partitioed firewalls, whose iversio metrics are small. I this sectio, we preset a class of firewalls, called modular firewalls, that have similar characteristics to those of simple ad partitioed firewalls. Therefore, the iversio metrics of modular firewalls are also small. A modular firewall M F is a partitioed firewall {MF 1,.., MF r } where each compoet MF k, called a firewall module, is a simple firewall. It follows that the iversio metric of each firewall module MF k is 1 or 2 ad the iversio metric of the modular firewall MF is 1 or 2. A modular firewall {MF 1,.., MF r } ca be desiged i two steps as follows. 1) The set of all packets is partitioed ito r ooverlappig classes: P C 1,.., P C r. 2) Each module MF k i the modular firewall is desiged to accept some (or all) of the packets that belog to the packet class P C k uder the restrictio that MF k, beig a simple firewall, must cosist of three bads: a discard bad B 0, followed by a accept bad B 1, followed by a bad B 2 that cosists of a discard-all rule The mai thesis of this paper is that desigig a modular firewall is easier tha desigig a equivalet moolithic firewall. To give some evidece to this thesis, we discuss ext a algorithm that ca take, as iput, a moolithic firewall F ad produce, as output, a equivalet modular firewall MF. Because the time complexity of this algorithm is small O( 2 ), where is the umber of rules i the iput firewall F, oe cocludes that desigig a modular firewall is ot harder tha desigig a equivalet moolithic firewall. The algorithm for modularizig a moolithic firewall is show i Algorithm 2. The correctess of Algorithm 2 follows from the followig two theorems. Theorem 6. Assume that Algorithm 2 is applied to a moolithic firewall F ad produced the simple firewalls {MF 1,.., MF r }. The o two distict firewalls MF i ad MF k accept the same packet (idicatig that the produced simple firewalls satisfy the oeess coditio). Proof: Without loss of geerality, assume that i is less tha k. This meas that the accept rules i bad B 1 of firewall MF i occur as discard rules i bad B 0 of firewall MF k. Thus, each packet that is accepted by (bad B 1 i) firewall MF i is discarded by (bad B 0 i) firewall MF k. Also, each packet Algorithm 2 Modularizig Moolithic Firewalls Iput: A moolithic firewall F with r accept bads (r is at least 1) Output: A modular firewall M F with r modules {MF 1,.., MF r } such that F ad MF are equivalet. Let the r accept bads of firewall F be AB 1,.., AB r i order. for every accept bad AB k i F do Desig the three bads B 0, B 1, ad B 2 of module MF k as follows. B 0 is the sequece of all rules that precedes AB k i F after modifyig their decisios to become discard B 1 is the sequece of all (accept) rules i AB k B 2 is the discard-all rule; Apply Algorithm 1 to remove the irrelevat rules from MF k ed for that is accepted by (bad B 1 i) firewall MF k is discarded by (bad B 2 i) firewall MF i. I other words, o packet is accepted by both MF i ad MF k. Theorem 7. Assume that Algorithm 2 is applied to a moolithic firewall F ad produced a modular firewall M F that cosists of the modules {MF 1,.., MF k }. 1) Each packet, that is accepted by F, is also accepted by MF 2) Each packet, that is accepted by MF, is also accepted by F (These two statemets idicate that F ad M F are equivalet.) Proof: 1) Assume that a packet p is accepted by F. Thus p is resolved by a rule i some accept bad AB k of F. This idicates that p is also resolved by a rule i the accept bad B 1 i module MF k i MF. Therefore p is accepted by MF. 2) Assume that a packet p is accepted by a module MF k i MF. Thus p is resolved by a rule i bad B 1 of module MF k. This idicates that p is also resolved by a rule i the accept bad AB k i firewall F. Therefore p is accepted by F. VIII. SIMULATION RESULTS I this paper, we preseted two algorithms: Algorithm 1 for removig irrelevat rules from simple firewalls, ad Algorithm 2 for modularizig moolithic firewalls. I fact, the importat role of Algorithm 1 is to be ivoked from withi Algorithm 2 to remove the irrelevat rules from the firewall modules i the computed modular firewall. I this sectio, we report the results of several simulatios that we carried out to measure the cost ad performace of Algorithm 2. (The cost ad

7 performace of Algorithm 1 cotribute to those of Algorithm 2.) Figure 2 shows the executio time of Algorithm 2, whe applied to modularize a moolithic firewall F, as a fuctio of the umber of rules i F. From this figure, the executio time of Algorithm 2 is very small, less tha half a secod, eve whe the firewall beig modularized has up to 2000 rules. Figure 3 shows the average umber of firewall modules, that result from applyig Algorithm 2 to modularize a moolithic firewall F, as a fuctio of the umber of rules i F. From this figure, a moolithic firewall that has 2000 rules ca be coverted ito a modular firewall with about 22 modules o average. Figure 4 shows the average umber of rules i a firewall module, that results from applyig Algorithm 2 to modularize a moolithic firewall F, as a fuctio of the umber of rules i F. From this figure, a moolithic firewall that has 2000 rules ca be coverted ito a modular firewall where a firewall module has 800 rules o average. Cosider the case where Algorithm 2 is applied to a moolithic firewall F to produce a equivalet modular firewall MF. As discussed i Sectio 6, F ca be implemeted as a sigle thread o a sigle core architecture, whereas the firewall modules i M F ca be implemeted o a multicore architecture. Let RF deote the rate (i packets per secod) of processig packets by the sigle core architecture, ad RM F deote the rate (i packets per secod) of processig packets by the multicore architecture. The RM F/RF is called the speed-up ratio. Figure 5 shows the speed-up ratio as a fuctio of the umber of rules i F. From this figure, the speed-up rages from 1.7 (whe the umber of rules i F is small) to 2.6 (whe the umber of rules i F is large). IX. RELATED WORK Firewalls are a critical lie of defece i cybersecurity, but ted to be very hard to uderstad. As firewall correctess is a hard but importat problem, there has bee extesive research i the field, followig four mai approaches: 1) Firewall Testig: To test a give firewall F, oe geerates may packets for which the expected decisios of F, accept or discard, are kow a priori. The geerated packets are the set to F, ad the actual decisios of F for these packets are observed. If the expected decisio for each geerated packet is the same as the actual decisio for the packet, oe cocludes that the give firewall F is correct. Otherwise, the give firewall F has errors. Differet methods of firewall testig differ i how the testig packets are geerated. For istace, the test packets ca be had-geerated by domai experts to target specific vulerabilities i the give firewall F, or geerated from the formal specificatios of the security policy of the give firewall F, as i [3]. A scheme for targetig test packets for better fault coverage is give i [4] ad [5]. Blowtorch [6] is a framework to geerate packets for testig. 2) Firewall Aalysis: To aalyze a give firewall F, oe applies a algorithm to idetify (some or all of the) vulerabilities, coflicts, aomalies, ad redudacies i the give firewall F. A systematic method for aalyzig firewalls is preseted i [7]. The cocept of coflicts betwee rules i a firewall is due to [8] ad [9]. A classificatio of aomalies, as well as algorithms to detect them, may be foud i [10] ad [11]. (This aalysis works for verifyig the security policies i IPsec ad VPN as well [12].) A framework for uderstadig the vulerabilities i a sigle firewall is outlied i [13], ad a aalysis of these vulerabilities preseted i [14]. [15] is a quatitative study of cofiguratio errors for a firewall. A example of a efficiet firewall aalysis algorithm is give i FIREMAN [16]. 3) Firewall Verificatio: To verify a give firewall F agaist a give property R, oe applies a algorithm to verify whether or ot F satisfies R. The questio of how to query a give firewall ad obtai the aswer (whether or ot it satisfies a give property) is discussed i [17] ad [18]. The time ad space complexity of these algorithms are proved to be O( d ) i [19]. I [20], a probabilistic verificatio algorithm is provided ad show to have a time ad space complexity of O(d). I [21], we provide a elegat algorithm for firewall verificatio whose space complexity is O(d), ad whose time complexity is order O( d ). 4) Firewall Desig: To esure a firewall does ot have vulerabilities or other problems, it ca be desiged from the outset usig structured algorithms. Such algorithms, that ca geerate a firewall from its specificatio, are provided i [22]. I this paper, we preset two ew metrics for the complexity of a firewall, ad show that these metrics are related. Further, we give a ew algorithm for implemetig firewalls such that the iversio metric of the firewall is small; this algorithm ca be cosidered a firewall desig algorithm to produce easy-touderstad firewalls. Our algorithm has the advatage that it eed ot be applied at the outset whe desigig a firewall; ay pre-existig firewall may be coverted to a modular firewall i O( 2 ) time. The advatage of a modular firewall is the cleaess of the desig; the low iversio metric makes such firewalls relatively easy to uderstad, ad permits modificatio with o uexpected side effects. A side beefit is that modular firewalls, beig iheretly parallel, also process packets faster tha equivalet covetioal firewalls. I this paper, we have dealt with modular firewalls located at a sigle iterface betwee two computer etworks. However, we do ot see ay reaso why modular firewalls caot be used for distributed firewalls, where firewall policies are distributed across may systems located at multiple poits i the etwork [11], [10], [19]. We pla to study the possibility of developig modular distributed firewalls i future work.

8 Fig. 2. Executio Time to Modularize a Moolithic Firewall Fig. 3. Average Number of Modules Produced Fig. 4. Average Number of Rules per Module Fig. 5. Speed-up Ratio

9 X. CONCLUDING REMARKS Firewalls are a very importat compoet of system security, but, ufortuately, curret firewalls are mostly desiged ad modified ad hoc; this makes them very difficult to uderstad, so it is ot ucommo for a large firewall with thousads of rules to have may vulerabilities. I this paper, we make three importat cotributios to the theory of firewalls ad firewall complexity. Our first cotributio is that we defie two metrics for the complexity of a firewall, called the depedecy metric ad the iversio metric. We also demostrate that the two are correlated, so desigig a firewall with a small value of iversio metric is likely to yield a firewall with a small value of depedecy metric as well. For our secod cotributio, we preset several classes of firewalls with a small iversio metric, as well as a method for desigig such firewalls. Our fial cotributio is that we show that the class of modular firewalls, which have a low iversio metric (1 2), is sufficietly powerful to describe ay firewall. Algorithm 2, preseted i this paper, ca take as iput ay firewall ad covert it ito a equivalet modular firewall. It may be oted that this paper itroduces two separate cocepts, which are iterestig i their ow right. The first cocept is, of course, firewall metrics - we itroduce the cocept of depedecy ad iversio metrics, ad develop a method to desig firewalls that are easy to uderstad by these measures. The secod, idepedet cocept is that of partitioed firewalls; we show how to decompose ay firewall ito multiple simpler firewalls, that together are equivalet to the origial firewall. By combiig the cocepts of simple firewalls (which have low iversio metrics) ad partitioed firewalls, we develop the cocept of modular firewalls. Our work aturally suggests several rich problems for further study. The depedecy metric ad the iversio metric are ot the oly possible metrics for the complexity of a firewall; it would be a iterestig problem to idetify other such metrics, show how they are related, ad possibly develop further algorithms to miimize the complexity of a firewall. The developmet of alterate algorithms to partitio ad modularize firewalls is aother area for further research. By varyig the algorithm, it is possible to produce modular firewalls with differet properties, such as size, performace, legth of modules, ad so o. For our ow future work, we ote that the method for costructig a partitioed firewall ivolves dividig the packet space ito partitios ad costructig a (simpler) firewall to classify the packets of each partitio idepedetly. By clearly specifyig how to partitio the packet space, ad whe to stop partitioig ad costruct a firewall, we aim to develop a recursive ew algorithm for firewall desig. XI. ACKNOWLEDGEMENTS The authors are grateful to Dr. Ehab Al-Shaer for his help i preparig the fial versio of this paper. REFERENCES [1] D. M. Tullse, S. J. Eggers, ad H. M. Levy, Simultaeous multithreadig: maximizig o-chip parallelism, i ISCA 95: Proceedigs of the 22d aual Iteratioal Symposium o Computer architecture, 1995, pp [2] J. E. Savage ad M. Zubair, A uified model for multicore architectures, i IFMT 08: Proceedigs of the 1st iteratioal forum o Nextgeeratio multicore/maycore techologies, 2008, pp [3] J. Jürjes ad G. Wimmel, Specificatio-based testig of firewalls, i Revised Papers from the 4th Iteratioal Adrei Ershov Memorial Coferece o Perspectives of System Iformatics, 2001, pp [4] A. El-Atawy, K. Ibrahim, H. Hamed, ad E. S. Al-Shaer, Policy segmetatio for itelliget firewall testig, Secure Network Protocols, (NPSec). 1st IEEE ICNP Workshop o, pp , Nov [5] E. Al-Shaer, A. El-Atawy, ad T. Samak, Automated pseudo-live testig of firewall cofiguratio eforcemet, IEEE Joural o Selected Areas i Commuicatio, vol. 27, o. 3, pp , [6] D. Hoffma ad K. Yoo, Blowtorch: a framework for firewall test automatio, i Proceedigs of the 20th IEEE/ACM iteratioal Coferece o Automated software egieerig, 2005, pp [7] A. J. Mayer, A. Wool, ad E. Ziskid, Fag: A firewall aalysis egie, i IEEE Symposium o Security ad Privacy, 2000, pp [8] H. Adiseshu, S. Suri, ad G. M. Parulkar, Detectig ad resolvig packet filter coflicts, i INFOCOM, 2000, pp [9] D. Eppstei ad S. Muthukrisha, Iteret packet filter maagemet ad rectagle geometry, i SODA, 2001, pp [10] E. S. Al-Shaer ad H. H. Hamed, Discovery of policy aomalies i distributed firewalls, i INFOCOM, [11] E. S. Al-Shaer, H. Hamed, R. Boutaba, ad M. Hasa, Coflict classificatio ad aalysis of distributed firewall policies, IEEE Joural o Selected Areas i Commuicatios, vol. 23, o. 10, pp , [12] H. H. Hamed, E. S. Al-Shaer, ad W. Marrero, Modelig ad verificatio of ipsec ad vp security policies, i ICNP, 2005, pp [13] M. Fratze, F. Kerschbaum, E. E. Schultz, ad S. Fahmy, A framework for uderstadig vulerabilities i firewalls usig a dataflow model of firewall iterals, Computers & Security, vol. 20, o. 3, pp , [14] S. Kamara, S. Fahmy, E. E. Schultz, F. Kerschbaum, ad M. Fratze, Aalysis of vulerabilities i iteret firewalls, Computers & Security, vol. 22, o. 3, pp , [15] A. Wool, A quatitative study of firewall cofiguratio errors, IEEE Computer, vol. 37, o. 6, pp , [16] L. Yua, J. Mai, Z. Su, H. Che, C.-N. Chuah, ad P. Mohapatra, Firema: A toolkit for firewall modelig ad aalysis, Security ad Privacy, IEEE Symposium o, vol. 0, pp , [17] A. X. Liu ad M. G. Gouda, Diverse firewall desig, IEEE Trasactios o Parallel ad Distributed Systems, vol. 19, o. 9, pp , [18], Firewall policy queries, IEEE Trasactios o Parallel ad Distributed Systems, vol. 20, o. 6, pp , [19] M. G. Gouda, A. X. Liu, ad M. Jafry, Verificatio of distributed firewalls, i Proceedigs of the IEEE Global Commuicatios Coferece (GLOBECOM), [20] H. B. Acharya ad M. G. Gouda, Liear-time verificatio of firewalls, i Proceedigs of the Iteratioal Coferece o Network Protocols, [21], Projectio ad divisio: Liear-space verificatio of firewalls, Distributed Computig Systems, Iteratioal Coferece o, pp , [22] M. G. Gouda ad A. X. Liu, Strucured firewall desig, Computer Networks, vol. 51, pp , 2007.

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem Lecture 4: Cauchy sequeces, Bolzao-Weierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Chapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

Notes on exponential generating functions and structures.

Notes on exponential generating functions and structures. Notes o expoetial geeratig fuctios ad structures. 1. The cocept of a structure. Cosider the followig coutig problems: (1) to fid for each the umber of partitios of a -elemet set, (2) to fid for each the

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Review: Classification Outline

Review: Classification Outline Data Miig CS 341, Sprig 2007 Decisio Trees Neural etworks Review: Lecture 6: Classificatio issues, regressio, bayesia classificatio Pretice Hall 2 Data Miig Core Techiques Classificatio Clusterig Associatio

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV [email protected] 1 Itroductio Imagie you are a matchmaker,

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA [email protected] Yilig Che School of Egieerig ad Applied

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

A Mathematical Perspective on Gambling

A Mathematical Perspective on Gambling A Mathematical Perspective o Gamblig Molly Maxwell Abstract. This paper presets some basic topics i probability ad statistics, icludig sample spaces, probabilistic evets, expectatios, the biomial ad ormal

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Dynamic House Allocation

Dynamic House Allocation Dyamic House Allocatio Sujit Gujar 1 ad James Zou 2 ad David C. Parkes 3 Abstract. We study a dyamic variat o the house allocatio problem. Each aget ows a distict object (a house) ad is able to trade its

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

MARTINGALES AND A BASIC APPLICATION

MARTINGALES AND A BASIC APPLICATION MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Lesson 15 ANOVA (analysis of variance)

Lesson 15 ANOVA (analysis of variance) Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

3. Greatest Common Divisor - Least Common Multiple

3. Greatest Common Divisor - Least Common Multiple 3 Greatest Commo Divisor - Least Commo Multiple Defiitio 31: The greatest commo divisor of two atural umbers a ad b is the largest atural umber c which divides both a ad b We deote the greatest commo gcd

More information

3 Basic Definitions of Probability Theory

3 Basic Definitions of Probability Theory 3 Basic Defiitios of Probability Theory 3defprob.tex: Feb 10, 2003 Classical probability Frequecy probability axiomatic probability Historical developemet: Classical Frequecy Axiomatic The Axiomatic defiitio

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

1 Correlation and Regression Analysis

1 Correlation and Regression Analysis 1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio

More information

Permutations, the Parity Theorem, and Determinants

Permutations, the Parity Theorem, and Determinants 1 Permutatios, the Parity Theorem, ad Determiats Joh A. Guber Departmet of Electrical ad Computer Egieerig Uiversity of Wiscosi Madiso Cotets 1 What is a Permutatio 1 2 Cycles 2 2.1 Traspositios 4 3 Orbits

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx SAMPLE QUESTIONS FOR FINAL EXAM REAL ANALYSIS I FALL 006 3 4 Fid the followig usig the defiitio of the Riema itegral: a 0 x + dx 3 Cosider the partitio P x 0 3, x 3 +, x 3 +,......, x 3 3 + 3 of the iterval

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

Section 11.3: The Integral Test

Section 11.3: The Integral Test Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult

More information

Entropy of bi-capacities

Entropy of bi-capacities Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace [email protected] Jea-Luc Marichal Applied Mathematics

More information

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms The Power of Free Brachig i a Geeral Model of Backtrackig ad Dyamic Programmig Algorithms SASHKA DAVIS IDA/Ceter for Computig Scieces Bowie, MD [email protected] RUSSELL IMPAGLIAZZO Dept. of Computer

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

7.1 Finding Rational Solutions of Polynomial Equations

7.1 Finding Rational Solutions of Polynomial Equations 4 Locker LESSON 7. Fidig Ratioal Solutios of Polyomial Equatios Name Class Date 7. Fidig Ratioal Solutios of Polyomial Equatios Essetial Questio: How do you fid the ratioal roots of a polyomial equatio?

More information

FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. 1. Powers of a matrix

FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. 1. Powers of a matrix FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. Powers of a matrix We begi with a propositio which illustrates the usefuless of the diagoalizatio. Recall that a square matrix A is diogaalizable if

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Exploratory Data Analysis

Exploratory Data Analysis 1 Exploratory Data Aalysis Exploratory data aalysis is ofte the rst step i a statistical aalysis, for it helps uderstadig the mai features of the particular sample that a aalyst is usig. Itelliget descriptios

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean 1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.

More information

Business Rules-Driven SOA. A Framework for Multi-Tenant Cloud Computing

Business Rules-Driven SOA. A Framework for Multi-Tenant Cloud Computing Lect. Phd. Liviu Gabriel CRETU / SPRERS evet Traiig o software services, Timisoara, Romaia, 6-10 dec 2010 www.feaa.uaic.ro Busiess Rules-Drive SOA. A Framework for Multi-Teat Cloud Computig Lect. Ph.D.

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

Lesson 17 Pearson s Correlation Coefficient

Lesson 17 Pearson s Correlation Coefficient Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig

More information

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find 1.8 Approximatig Area uder a curve with rectagles 1.6 To fid the area uder a curve we approximate the area usig rectagles ad the use limits to fid 1.4 the area. Example 1 Suppose we wat to estimate 1.

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff,

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff, NEW HIGH PERFORMNCE COMPUTTIONL METHODS FOR MORTGGES ND NNUITIES Yuri Shestopaloff, Geerally, mortgage ad auity equatios do ot have aalytical solutios for ukow iterest rate, which has to be foud usig umerical

More information

On Formula to Compute Primes. and the n th Prime

On Formula to Compute Primes. and the n th Prime Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao [email protected] amih Abdul-Nabi

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8 CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 [email protected] Abstract:

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

BENEFIT-COST ANALYSIS Financial and Economic Appraisal using Spreadsheets

BENEFIT-COST ANALYSIS Financial and Economic Appraisal using Spreadsheets BENEIT-CST ANALYSIS iacial ad Ecoomic Appraisal usig Spreadsheets Ch. 2: Ivestmet Appraisal - Priciples Harry Campbell & Richard Brow School of Ecoomics The Uiversity of Queeslad Review of basic cocepts

More information

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

Class Meeting # 16: The Fourier Transform on R n

Class Meeting # 16: The Fourier Transform on R n MATH 18.152 COUSE NOTES - CLASS MEETING # 16 18.152 Itroductio to PDEs, Fall 2011 Professor: Jared Speck Class Meetig # 16: The Fourier Trasform o 1. Itroductio to the Fourier Trasform Earlier i the course,

More information

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India.. (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Ekkehart Schlicht: Economic Surplus and Derived Demand

Ekkehart Schlicht: Economic Surplus and Derived Demand Ekkehart Schlicht: Ecoomic Surplus ad Derived Demad Muich Discussio Paper No. 2006-17 Departmet of Ecoomics Uiversity of Muich Volkswirtschaftliche Fakultät Ludwig-Maximilias-Uiversität Müche Olie at http://epub.ub.ui-mueche.de/940/

More information