Reducing the Size of Rule Set in a Firewall
|
|
|
- Anabel Gardner
- 10 years ago
- Views:
Transcription
1 Reducing the Size of Rule Set in a Firewall MyungKeun Yoon Shigang Chen Zhan Zhang Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA (phone), (fax), {myoon, sgchen, zzhan}@cise.ufl.edu Abstract A firewall s complexity is known to increase with the size of its rule set. Complex firewalls are more likely to have configuration errors which cause security loopholes. Until now, two rules can be merged into one only when they are exactly same for all the dimensions except one for which each value of two rules should be adjacent to each other. In this paper, we propose a new and aggressive reduction algorithm which finds a group of rules and replace it with a smaller new group so that the total size of rule set can be reduced. This can not be achievable by any previous work because all of them eliminate rules only when these rules are redundant by other rules in the same rule set. The proposed algorithm is also orthogonal to the previous works so that it can be used to supplement them. Key Words: firewall, rule management, network security I. INTRODUCTION Firewalls are the cornerstones of corporate intranet security. Once a company acquires a firewall, a system administrator must configure and manage it according to a security policy that meets the company s needs. Configuration is a crucial task, probably the most important factor to determine a security level [1]. A firewall rule set consists of a large number of rules. A single rule typically includes a group of source addresses, a group of destination addresses, a group of source ports, a group of destination ports, a group of services and an appropriate action. The action can be either accept or. For the sake of brevity, we consider only accept or, while recent firewalls can support other types of action such as writing a log record, applying a proxy, and implementing a virtual private network (VPN) [20]. In many firewalls, the rule set is order-sensitive: the firewall checks if the first rule in the rule set applies to a new session. If so, the packets are either dropped or let through according to the action of the first rule. Otherwise, the firewall checks if the second rule applies, and so forth [11]. Analyzing firewall rule sets from various organizations in the telecommunications, financial institutes, etc., Wool quantified the complexity of a rule set in terms of the numbers of rules, network objects, and interfaces [2]. While firewall managers intuitively classify a rule set as complicated or simple, Wool quantifies this intuition into a concrete measure of rule complexity (RC) as follows [2]: Interfaces (Interfaces 1) RC = Rules + Objects + 2 (1) where Rules is the raw number of rules in the rule set, Objects is the number of network objects, and Interfaces is the number of interfaces on the firewall. As complex rule sets easily cause mistakes and mal-configurations in firewall security, it is very important to configure the rule set as small as possible for enhancing firewall security, or the security of enterprise networks [2]. In most real world networks, because the numbers of Interfaces and Objects are relatively small compared to the number of Rules, it is important to make Rules small. In this paper, we propose how to reduce the size of rule set so that network security can be enhanced. To reduce rule set, previous works rely on merging two rules into one only when they are all the same except one dimension for which the values of the two rules should be adjacent to each other. To the contrary, our approach is new and aggressive in that it finds a group of rules and replace it with a smaller new group. Our algorithm is also orthogonal to the previous works like [4] so that it can be used together with them to achieve more optimal result. The proposed algorithm can be applied to a general classification problem as well as firewall s rule set. The rest of paper is organized as follows. Section II surveys the related work. Section III proposes simple substitutional optimization (SSO), which covers the basic idea of the substituting approach to reduce the size of rule set. Section IV presents complex substitutional optimization (CSO), which is based on SSO and the algorithms from [4]. Section V draws the conclusion. II. RELATED WORKS Gouda and Liu proposed the firewall decision diagram (FDD) to represent a rule set as a tree structure. This diagram makes it possible to check the consistency and completeness of the rule set systematically. They developed a sequence of five algorithms that can be applied to FDD to generate a compact sequence of rule set while maintaining the consistency and completeness of the original rule set [4]. They also proposed a method for diverse firewall design and presented algorithms to detect discrepancies between two rule sets for the same firewall [5]. Firewall rule sets have to be written, ordered and distributed carefully in order to avoid firewall policy anomalies that may expose a network to danger. Al-Shaer and Hamed identified anomalies that could exist in a single- or multifirewall environment. They also presented a set of techniques and algorithms to discover policy anomalies in centralized and distributed legacy firewalls [6]. Smith et al. dealt with the issue of how to place a set of firewalls around a complex network, /07/$ IEEE 1274
2 with varying security needs of the different nodes, in order to minimize cost and delay. An operations research view was proposed into the deployment of multiple firewalls [19]. Since the syntax and semantics of the rule set and their ordering depend on the firewall product/vendor, firewall management becomes difficult. This is akin to the dark age of software development, where programs were written in assembly language and thus the programmer had to know all the idiosyncrasies of the target processor. This problem gets even worse when there are many firewalls dividing a company s intranets into multiple domains [11]. Many approaches were proposed to use a high-level language to define and analyze firewall policies and then map this language to filtering rules [11], [12], [13], [14], [17]. Packet filtering of a firewall can be viewed as a special case of packet classification. The packet classification problem is to determine the first matching rule for each incoming packet at a router. A good tutorial is provided by Gupta et al. on packet classification algorithms such as basic search algorithms, geometric algorithms, heuristic algorithms, and hardware-specific algorithms [9]. Traditionally, researchers of packet classification have focused on how to find matching rules as fast as possible using sophisticated data-structures or hardware-driven approaches, most of which are beyond the scope of this paper [7], [8], [9], [10], [15], [16]. Some of them deal with how to reduce the size of a rule set. Gupta identified special types of redundant rules in his PhD thesis [8], namely backward redundant rules and forward redundant rules, by studying 793 packet classifiers from 101 different Internet Service Providers and enterprise networks with a total of 41,505 rules [3]. A rule r in a packet classifier is backward redundant iff there exists another rule r listed above r such that all packets that match r also match r. Gupta observed that on average 7.8% of the rules in a packet classifier are backward redundant [8]. A rule r in a packet classifier is forward redundant iff there exists another rule r listed below r such that the following three conditions hold: (1) all packets that match r also match r, (2) r and r have the same decision, (3) for each rule r listed between r and r either r and r have the same decision, or no packet matches both r and r. Gupta observed that on average 7.2% of the rules in a packet classifier are forward redundant [8]. Liu et al. suggested how to find and eliminate upward redundant rules and downward redundant rules [3]. Upward/downward redundant rules include backward/forward redundant rules. A rule r in a packet classifier is upward redundant iff there is no packet whose first matching rule is r. Geometrically, a rule is upward redundant in a packet classifier if the rule is overlayed by some rules listed above it. A rule r in a packet classifier, where no rule is upward redundant, is downward redundant iff for each packet, whose first matching rule is r, the first matching rule below r has the same decision as r [3]. Useful tips on implementing firewalls are presented in [20]. This practical document addresses concepts relating to the design, selection, deployment, and management of firewalls TABLE I FIREW RULE SET AND OPTIMIZATION (A) Original rule set (B) Optimized rule set [4] (1)F 0 [1,4] F 1 [1,10] d (2)F 0 [5,8] F 1 [1,2] d (3)F 0 [5,6] F 1 [3,8] a (4)F 0 [7,8] F 1 [3,4] a (5)F 0 [7,8] F 1 [5,5] d (6)F 0 [7,8] F 1 [6,8] a (7)F 0 [5,8] F 1 [9,10] d (8)F 0 [9,10] F 1 [1,10] d (1)F 0 [5,6] F 1 [3,8] a (2)F 0 [7,8] F 1 [3,4] a (3)F 0 [7,8] F 1 [6,8] a (4)F 0 [1,10] F 1 [1,10] d (C) Best optimization (1)F 0 [7,8] F 1 [5,5] d (2)F 0 [5,8] F 1 [3,8] a (3)F 0 [1,10] F 1 [1,10] d and firewall environment. The usefulness of direction-based filtering in firewalls is shown in [21]. It shows that the discrepancy can make it very confusing for firewall managers to recognize the direction of a packet correctly. Improving traditional firewall performance is shown in [22] by reducing the number of rule comparisons required per packet. This is done by placing the most frequently matched rules around the beginning of the rule set. Directed acyclical graphs are used to represent the presence of rules efficiently. It is proved as an NP-complete problem to find an optimal graph. III. SIMPLE SUBSTITUTIONAL OPTIMIZATION (SSO) A. Definition A firewall s rule set consists of rules where first coming rules have higher priority. We denote rule r i as r i =(F 0 S 0...F i S i...f n 1 S n 1 Action) in accordance with the notations used in [4]. For simplicity, we denote rule r i s S m value as r i.s m. We only consider two types of Action: a (accept) or d (). Each F i represents for a unique dimension. In general, F i can be IP addresses (source/destination), or port numbers (source/destination), or protocol types (TCP/UDP/ICMP). S i is range-values. For simplicity, we assume that each dimension ranges from 1 to 10. In the real world, the dimension of IP address ranges from 0to while port numbers range from 0 to Table I shows three rule sets, (A), (B), and (C), all of which have the same meaning. In this example, each rule set consists of two dimensions. Table I (A) has 8 rules that can be represented by two-dimensional rectangles as in [10]. Fig. 1 illustrates table I (A) as two dimensional rectangles. In this paper, we say that two rules r i and r j are adjacent when they satisfy two conditions: r i.s m equals r j.s m for (0 m n 2). r i.s n 1 is adjacent to r j.s n 1, i.e., Min(r i.s n 1 )=Max(r j.s n 1 )+1 or Min(r j.s n 1 )=Max(r i.s n 1 )+1. When two rules are adjacent, they can be merged into one as (F 0 S 0...F i S i...f n 1 (r i.s n 1 r j.s n 1 )) Until now, two rules can be merged into one only if they are adjacent. In this paper, we propose to reduce rule set by replacing a group of rules with other smaller group even though they are not adjacent. 1275
3 accept (r k ) accept (r i ) accept (r j ) [3,8] [5,6] [3,4] [6,8] [1,2] [9,10] F0 [7,8] [1,2] [5,5] [9,10] [1,4] [9,10] a Fig. 3. d FDD for table I (B) Fig. 1. Fig. 2. B. Basic Idea /18 Two dimensional representation for table 1 (A) /18, interface /18, interface /18, interface /18, interface 1... Interface 0 Interface 1 Router / / /18 Substitutional optimization example for routing table The number of rules can be reduced by substituting a new group of rules for a given group. Fig. 2 shows an example in a routing table. The class B network of /16 is divided into four sub-networks: /18, /18, /18 and /18. To forward packets to appropriate interfaces, the router has four rules as shown in Fig. 2. However, an experienced router manager can make the routing table simpler by substituting a new group of two rules ( /18 interface0, /16 interface1) for the old four rules. In this paper, we propose to apply this basic substitutional optimization to firewall s rule set. To optimize firewall s rule set, Gouda et al. propose five algorithms for designing the sequence of rules in a firewall to be consistent, complete, and compact [4]. These algorithms include reduction, marking, generation, compactness, and simplification. As in [4], we denote firewall s rule set as R. Table I (B) shows how R changes after applying these five algorithms to rule set (A). In this example, half the rules are eliminated while the semantics of the rule set remains same. Fig. 3 shows FDD for R in table I (B). However, as shown in table I (C), the rule set can be reduced further, which can not be achievable by any previous work [3], [4], [7], [8]. This is because previous approaches can eliminate some rules only when they are redundant by other rules. To the contrary, the rule set of table I (C) can be obtained by our proposal, Substitutional Optimization (SO). C. Algorithm We propose a simple algorithm, simple substitutional optimization (SSO). It can reduce the number of firewall s rule set aggressively when a certain condition is satisfied. We assume that a rule set has already been converted into FDD [4] and SSO uses it as an input. Therefore, no rules are overlapped with each other when SSO starts. We define replicable-group as a group of rules which can be replaced by other smaller group without changing the meaning of the rule set. For example, in Fig. 1, the rule set of {(F 0 [5, 6] F 1 [3, 8] a), (F 0 [7, 8] F 1 [3, 4] a), (F 0 [7, 8] F 1 [6, 8] a), (F 0 [7, 8] F 1 [5, 5] d)} can be substituted by a group of two rules {(F 0 [7, 8] F 1 [5, 5] d), (F 0 [5, 8] F 1 [3, 8] a)}. In this case, the first three rules of the original rule set form a replicablegroup: {(F 0 [5, 6] F 1 [3, 8] a), (F 0 [7, 8] F 1 [3, 4] a), (F 0 [7, 8] F 1 [6, 8] a)}. In general, a replicablegroup is defined as a group of three rules (r i,r j,r k ) that has the following properties (we use the same notations of Fig. 1): (1) r i.s m = r j.s m = r k.s m, (0 m n 3) (2) r i.s n 2 = r j.s n 2,r i.s n 2 r k.s n 2 (3) r i.s n 2 are adjacent to r k.s n 2 (4) r i.action = r j.action = r k.action (5) r i.s n 1 r k.s n 1,Max(r i.s n 1 )=Max(r k.s n 1 ) (6) r j.s n 1 r k.s n 1,Min(r j.s n 1 )=Min(r k.s n 1 ) The first property means that S m values should be same except two dimensions: m =(n 2) and (n 1). InFig. 1, x and y-axes represent for dimension (n 2) and (n 1) respectively. The second property says that only two of the three rules have the same value for S n 2. The other properties mean that r i, r j and r k forms a bracket-like shape as in Fig. 1. For a replicable-group of (r i,r j,r k ), we define an inscribedrule r id and an inscribing-rule r ig as follows: r id =(F 0 S 0...F n 3 S n 3 F n 2 r i.s n 2 F n 1 (r k.s n 1 r i.s n 1 r j.s n 1 ) r i.action) (2) 1276
4 R={}; SSO(R) { Find r i, r j, and r k satisfying following conditions; (1) r i.s m = r j.s m = r k.s m, (0 m n 3) (2) r i.s n 2 = r j.s n 2,r i.s n 2 r k.s n 2 (3) r i.s n 2 are adjacent to r k.s n 2 (4) r i.action = r j.action = r k.action (5) r i.s n 1 r k.s n 1,Max(r i.s n 1 )=Max(r k.s n 1 ) (6) r j.s n 1 r k.s n 1,Min(r j.s n 1 )=Min(r k.s n 1 ) R = R {r i,r j,r k } + {r ig }; R = R {r id }; } Fig. 4. SSO Algorithm r ig = (F 0 S 0...F n 3 S n 3 F n 2 (r i.s n 2 r k.s n 2 ) F n 1 r k.s n 1 r i.action) (3) where r i.action is the opposite of r i s action. Geometrically, a replicable-group and r id form a rectangle in which S n 2 and S n 1 are the ranges for the lower and the upper bases, and r id is the inscribed rectangle. Every pair of a replicable-group and r id can be replaced with a smaller rule set by the following theorem 1. Theorem 1: A replicable-group consisting of r i, r j and r k can be replaced with r id and r ig to decrease the number of rules for a given rule set. P roof : If r id is placed above r ig, the semantics of the original rule set R remains same over the area of (F 0 S 0...F n 3 S n 3 F n 2 (r i.s n 2 r k.s n 2 ) F n 1 (r k.s n 1 r i.s n 1 r j.s n 1 )). IfR includes r id explicitly, the number of rules will decrease to R 2 after substitution. If not, it will be R 1. In any case, substitution decreases the number of rules. Fig. 4 shows the algorithm for SSO. Besides R, weuse temporary rule set R to maintain high priority rules separately. In fact, R is a set of r id s, and will be merged with R at the end of the whole algorithm. D. Example For an example, we apply SSO to Fig. 1. A replicablegroup of r i, r j and r k is found as follows: r i = {F 0 [7, 8] F 1 [6, 8] a} r j = {F 0 [7, 8] F 1 [3, 4] a} r k = {F 0 [5, 6] F 1 [3, 8] a} By equation 2 and 3, r id and r ig become r id = {F 0 [7, 8] F 1 [5, 5] d} r ig = {F 0 [5, 8] F 1 [3, 8] a} Table II shows R and R after SSO has been applied to table I (A). The number of rules has been decreased by two. R R TABLE II AFTER SSO(R) IS EXECUTED (1)F 0 [1,4] F 1 [1,10] d (2)F 0 [5,8] F 1 [1,2] d (3)F 0 [5,8] F 1 [3,8] a (4)F 0 [5,8] F 1 [9,10] d (5)F 0 [9,10] F 1 [1,10] d (1)F 0 [7,8] F 1 [5,5] d IV. COMPLEX SUBSTITUTIONAL OPTIMIZATION (CSO) A. Basic Idea We can combine SSO and the five algorithms proposed in [4], which we call complex substitutional optimization (CSO). After a replicable-group in R is substituted by r id and r ig, some rules in the changed rule set may become adjacent to each other. This can happen because CSO can eliminate some rules that have prevented other rules from being merged together and abbreviated. If then, we can use again the ideas of [4], [7] to merge two adjacent rules so that the total size of rule set decreases further. In this way, CSO can reduce rule set dramatically when used together with the algorithms from [4]. B. Algorithm SSO can be used together with the five algorithms from [4]: reduction, marking, generation, compactness, and simplif ication. More specifically, SSO is executed repetitively together with reduction. So, the input to SSO does not have marking as in [4]. We also assume that no dimension is allowed to disappear until the end of the whole algorithm. Fig. 5 shows CSO algorithm in which SSO is mixed up with the five algorithms from [4]. During the while loop, reduction and SSO are repeated alternatively until no substitution happens. Reduction should be executed before SSO is executed since reduction can make adjacent rules merged into one so that SSO does not need to take care of it. For example, if rule (2) in table I (A) were two rules of {F 0 [5, 6] F 1 [1, 2] d} and {F 0 [7, 8] F 1 [1, 2] d}, reduction would put them together into {F 0 [5, 8] F 1 [1, 2] d} before SSO is applied to. Once the while loop exits, we can benefit the five algorithms from [4]. Readers who want to know details about reduction, marking, generation, compactness, and simplif ication should refer [4]. At the end of the whole algorithm, we concatenate R to R. All rules from R precede any of R. In this way, R has higher priority to R since we assumed that a first-matching rule has high priority when conflict happens. C. Example We show how efficiently CSO optimizes the firewall s rule set in table III. The original rule set has three dimensions each of which ranges from 1 to 10. According to CSO algorithm in Fig. 5, reduction is executed first of all, but it does not reduce any rule. Next, 1277
5 CSO(R) { R ={}; While (any change at SSO subroutine) { reduction(r); SSO(R); } reduction(r); marking(r); generation(r); compactness(r); simplification(r); R=merge(R,R ); } Fig. 5. CSO Algorithm SSO is applied to the rule set. After this first substitution, we obtain two rule sets, R and R, which decrease the size of rule set by four rules. This is shown in table IV. For example, rules (1), (4) and (5) in table III forms a replicable-group. In Table IV, they are replaced by rule (1) in R and rule (1) in R. Each of them corresponds to r ig and r id. In this case, rule (7) in table III equals r id, i.e., explicitly defined in the original rule set. Similarly, rules (9), (10), (12), and (14) in table III are replaced with rule (6) in R and rule (2) in R in table IV. Since there was a change in SSO, we reenter the while loop. After second reduction in the while loop is applied, rules of table IV (R) are reduced to five rules in table V: three belongs to R and two belongs to R. For example, rules (1) and (6) in table IV (R) are reduced to rule (1) in table V (R). Rules (2), (4), (7) and (9) in table IV (R) are reduced to rule (2) in table V (R). Similarly, rules (3), (5), (8) and (10) in table IV (R) are reduced to rule (3) in table V (R). R remains same since this is used by only SSO. Since no more change happens during the next SSO, we exit the while loop. From now, we can benefit the algorithms from [4], and just need to merge R and R to make a new optimized rule set. Fig. 6 is FDD for R of table V (R) before reduction is applied. After applying reduction, marking, generation, compactness and simplification to this FDD, we get the third and the fourth rules shown in table VI (A). After merge, the first and the second rules in table VI (A) are added up. The final rule set consists of only four rules as in thetablevi(a). Fig. 7 and table VI (B) show FDD and R when the algorithms from [4] are executed without SO. In conclusion, for this simple example, CSO reduces the size of rule set from 16 to 4, resulting in 75% reduction, while the state-of-the-art algorithm eliminated 6 rules, that is just 37.5% reduction. V. CONCLUSION In this paper, we proposed new algorithms for optimizing firewall s rule set: SSO and CSO. We observe that previous works could merge two rules into one only when they are adjacent. Our approach expands this one dimensional merger to two dimensional substitution. In CSO, we augment SSO TABLE III ORIGINAL RULE SET (1) F 0 [1, 5] F 1 [1, 3] F 2 [2, 7] a (2) F 0 [1, 5] F 1 [1, 3] F 2 [1, 1] d (3) F 0 [1, 5] F 1 [1, 3] F 2 [8, 10] d (4) F 0 [1, 5] F 1 [4, 10] F 2 [5, 7] a (5) F 0 [1, 5] F 1 [4, 10] F 2 [2, 3] a (6) F 0 [1, 5] F 1 [4, 10] F 2 [1, 1] d (7) F 0 [1, 5] F 1 [4, 10] F 2 [4, 4] d (8) F 0 [1, 5] F 1 [4, 10] F 2 [8, 10] d (9) F 0 [6, 10] F 1 [5, 10] F 2 [2, 3] a (10) F 0 [6, 10] F 1 [5, 10] F 2 [5, 7] a (11) F 0 [6, 10] F 1 [5, 10] F 2 [1, 1] d (12) F 0 [6, 10] F 1 [5, 10] F 2 [4, 4] d (13) F 0 [6, 10] F 1 [5, 10] F 2 [8, 10] d (14) F 0 [6, 10] F 1 [1, 4] F 2 [2, 7] a (15) F 0 [6, 10] F 1 [1, 4] F 2 [1, 1] d (16) F 0 [6, 10] F 1 [1, 4] F 2 [8, 10] d TABLE IV RULE SET AFTER THE FIRST SSO APPLIED R (1) F 0 [1, 5] F 1 [1, 10] F 2 [2, 7] a (2) F 0 [1, 5] F 1 [1, 3] F 2 [1, 1] d (3) F 0 [1, 5] F 1 [1, 3] F 2 [8, 10] d (4) F 0 [1, 5] F 1 [4, 10] F 2 [1, 1] d (5) F 0 [1, 5] F 1 [4, 10] F 2 [8, 10] d (6) F 0 [6, 10] F 1 [1, 10] F 2 [2, 7] a (7) F 0 [6, 10] F 1 [5, 10] F 2 [1, 1] d (8) F 0 [6, 10] F 1 [5, 10] F 2 [8, 10] d (9) F 0 [6, 10] F 1 [1, 4] F 2 [1, 1] d (10) F 0 [6, 10] F 1 [1, 4] F 2 [8, 10] d R (1) F 0 [1, 5] F 1 [4, 10] F 2 [4, 4] d (2) F 0 [6, 10] F 1 [5, 10] F 2 [4, 4] d TABLE V RULE SET AFTER WHILE LOOP FINISHED R (1) F 0 [1, 10] F 1 [1, 10] F 2 [2, 7] a (2) F 0 [1, 10] F 1 [1, 10] F 2 [1, 1] d (3) F 0 [1, 10] F 1 [1, 10] F 2 [8, 10] d R (1) F 0 [1, 5] F 1 [4, 10] F 2 [4, 4] d (2) F 0 [6, 10] F 1 [5, 10] F 2 [4, 4] d TABLE VI FINAL RULE SET AND COMPARISON WITH [4] A. Final rule set obtained by CSO (1)F 0 [1, 5] F 1 [4, 10] F 2 [4, 4] d (2)F 0 [6, 10] F 1 [5, 10] F 2 [4, 4] d (3)F 0 [1, 10] F 1 [1, 10] F 2 [2, 7] a (4)F 0 F 1 F 2 d B. Final rule set obtained by [4] (1)F 0 [1, 5] F 1 [1, 3] F 2 [2, 7] a (2)F 0 [1, 5] F 1 [1, 3] F 2 d (3)F 0 [1, 5] F 1 F 2 [2, 3] a (4)F 0 [1, 5] F 1 F 2 [5, 7] a (5)F 0 [1, 5] F 1 F 2 d (6)F 0 F 1 [5, 10] F 2 [2, 3] a (7)F 0 F 1 [5, 10] F 2 [5, 7] a (8)F 0 F 1 [5, 10] F 2 d (9)F 0 F 1 F 2 [2, 7] a (10)F 0 F 1 F 2 d 1278
6 Fig. 6. a a [1,10] [1,10] F0 F2 [2,7] [1,1] FDD for table V (R) before reduction [1,5] [4,4] F2 [1,1] F2 [1,1] F2 F2 [2,3] [2,7] [5,7] F0 d [6,10] [1,3] [4,10] [1,4] [5,10] [2,7] [2,3] [5,7] [4,4] [1,1] [1,1] d [5] A. X. Liu and M. G. Gouda, Diverse Firewall Design, Proc. of IEEE International Conference on Dependable Systems and Networks (DSN- 04), pp , June [6] E. S. Al-Shaer and H. H. Hamed, Discovery of Policy Anomalies in Distributed Firewalls, Proc. of IEEE Infocom 2004, March [7] P. Gupta and N. McKeown, Packet Classification on Multiple Fields, Proc. of ACM SIGCOMM, [8] P. Gupta, Algorithms for Routing Lookups and Packet Classification, PhD Thesis, Stanford University, [9] P. Gupta and N. McKeown, Algorithms for Packet Classification, IEEE Network, 15(2):, pp , March [10] T. Lakshman and D. Stiliadis, High-Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching, Proc. of ACM SIGCOMM, [11] Y. Bartal, A. Mayer, K. Nissim, and A. Wool, Firmato: a novel firewall management toolkit, ACM Transactions On Computer Systems, vol. 22, issue 4, pp , November [12] J. D. Guttman, Filtering Postures: Local Enforcement for Global Policies, Proc. of IEEE Symposium on Security and Privacy, [13] A. Mayer, A. Wool, and E. Ziskind, Fang: A Firewall Analysis Engine, Proc. of IEEE Symposium on Security and Privacy, [14] A. D. Keromytis and J. Wright, Transparent Network Security Policy Enforcement, Proc. of USENIX 2000 Annual Technical Conference, pp , June [15] A. Hari, S. Suri, and G. Parulkar, Detecting and Resolving Packet Filter Conflicts, Proc. of IEEE Infocom, March [16] V.Srinivasan, G.Varghese, S.Suri and M.Waldvogel, Fast and Scalable Layer Four Switching, Proc. of ACM SIGCOMM, [17] S.Hazelhurst, A.Attar and R.Sinnappan, Algorithms for Improving the Dependability of Firewall and Filter Rule Lists, Proc. of International Conference on Dependable Systems and Networks (DSN 2000), [18] S. Ioannidis, A. D. Keromytis, S. Bellovin, and J. M. Smith, Implementing a Distributed Firewall, Proc. of ACM Computer and Communications Security (CCS) 2000, pp , [19] R. N. Smith, Y. Chen, and S. Bhattacharya, Cascade of Distributed and Cooperating Firewalls in a Secure Data Network, IEEE Trans. On Knowledge and Data Engineering, Vol. 15, No. 5, [20] J. Wack, K. Cutler, and J. Pole, Guidelines on Firewalls and Firewall Policy, National Institute of Standards and Technology, January [21] A. Wool, The use and usability of direction-based filtering in firewalls, Computers & Security, 23(6), pp , [22] E. W. Fulp, Optimization of Network Firewall Policies Using Ordered Sets and Directed Acyclical Graphs, Proc. of IEEE Internet Management Conference, Fig. 7. FDD for table III before reduction in such a way that SSO is used together with the previous work [4]. We showed that CSO can reduce rule set in a new manner, which is not achievable by any previous work. The proposed algorithm is aggressive in reducing firewall s rule set since it can reduce the size of rule set by actively substituting a smaller group of rules for a larger existing group. This is an innovative approach since previous works depend on only adjacent relationship between two rules for reducing rule set. The proposed algorithm can also be applied to a general classification problem as well as firewall s rule set. REFERENCES [1] A. Rubin, D. Geer, and M. Ranum, Web Security Sourcebook, Wiley Computer Publishing, [2] A. Wool, A quantitative study of firewall configuration errors, IEEE Computer, vol. 37, no. 6, pp , June [3] A. X. Liu and M. G. Gouda, Removing Redundancy from Packet Classifiers, Proc. of ACM SIGCOMM, [4] M. G. Gouda and A. X. Liu, Firewall Design: Consistency, Completeness and Compactness, Proc. of ICDCS-04, pp , March
The Research and Application of Multi-Firewall Technology in Enterprise Network Security
, pp. 53-6 http://dx.doi.org/0.457/ijsia.05.9.5.6 The Research and Application of Multi-Firewall Technology in Enterprise Network Security Jing Li College of Information Engineering, Qingdao University,
Optimization of Firewall Filtering Rules by a Thorough Rewriting
LANOMS 2005-4th Latin American Network Operations and Management Symposium 77 Optimization of Firewall Filtering Rules by a Thorough Rewriting Yi Zhang 1 Yong Zhang 2 and Weinong Wang 3 1, 2, 3 Department
Complete Redundancy Detection in Firewalls
Complete Redundancy Detection in Firewalls Alex X. Liu and Mohamed G. Gouda Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, USA {alex, gouda}@cs.utexas.edu
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
Firewall Queries. Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu 2 Department of Computer Science, Texas State University,
Firewall Queries Alex X. Liu 1, Mohamed G. Gouda 1, Huibo H. Ma 2, Anne HH. Ngu 2 1 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
Firewall Policy Anomaly Management with Optimizing Rule Order
Firewall Policy Anomaly Management with Optimizing Rule Order 1.Ms. Swati S. Kachare, 2 Dr. P.K. Deshmukh 1,Computer Department - Rajarshi Shahu College of Engg. Pune 2.Computer Department - Rajarshi Shahu
Comparing and debugging firewall rule tables
Comparing and debugging firewall rule tables L. Lu, R. Safavi-Naini, J. Horton and W. Susilo Abstract: Firewalls are one of the essential components of secure networks. However, configuring firewall rule
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain
Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain Kamarasa V D S Santhosh M.Tech Student, Department of ComputerScience & Engineering, School of Technology, Gitam University,
Management of Exceptions on Access Control Policies
Management of Exceptions on Access Control Policies J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France, {frederic.cuppens,nora.cuppens}@enst-bretagne.fr
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization
An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization Yogita Nikhare 1 andprof. Anil Bende 2 1 M.TechScholar, Department of Computer Science
Firewall Configuration based on Specifications of Access Policy and Network Environment
Firewall Configuration based on Specifications of Access Policy and Network Environment A. Titov, V. Zaborovsky Saint-Petersburg State Polytechnical University, Russia [email protected], [email protected] Abstract
How To Design A Firewall As A Sequence Of Rules
Computer Networks 51 (2007) 1106 1120 www.elsevier.com/locate/comnet Structured firewall design q Mohamed G. Gouda, Alex X. Liu * Department of Computer Sciences, The University of Texas at Austin, Austin,
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:
ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280. www.semargroup.org
ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280 www.semargroup.org Firewall Policy Anomaly Detection and Resolution R.V.DARADE 1, PROF.P.B.KUMBHARKAR 2 1 Dept of Computer Engineering, SCOE, Sudumbare,
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Methods for Firewall Policy Detection and Prevention
Methods for Firewall Policy Detection and Prevention Hemkumar D Asst Professor Dept. of Computer science and Engineering Sharda University, Greater Noida NCR Mohit Chugh B.tech (Information Technology)
Trie-Based Policy Representations for Network Firewalls
Proceedings of the IEEE International Symposium on Computer Communications, 2005 Trie-Based Policy Representations for Network Firewalls Errin W. Fulp and Stephen J. Tarsa Wake Forest University Department
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs Ashish Tapdiya and Errin W. Fulp Department of Computer Science Wake Forest University Winston Salem, NC, USA nsg.cs.wfu.edu Email:
Firewall Policy Change-Impact Analysis
15 Firewall Policy Change-Impact Analysis ALEX X LIU, Michigan State University Firewalls are the cornerstones of the security infrastructure for most enterprises They have been widely deployed for protecting
Firewall Design: Consistency, Completeness, and Compactness
C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,
Policy Distribution Methods for Function Parallel Firewalls
Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,
Conflict Classification and Analysis of Distributed Firewall Policies
Conflict Classification and Analysis of Distributed Firewall Policies 1 Ehab Al-Shaer and Hazem Hamed School of Computer Science DePaul University, Chicago, USA Email: {ehab, hhamed}@cs.depaul.edu Raouf
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
II. BASICS OF PACKET FILTERING
Use of Formal models for the Firewall Policy Optimization ShatanandPatil* and B. B. Meshram** *(Department of Computer Technology, Veermata Jijabai Technical Institute, Mumbai 19) *(Department of Computer
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
Firewall Compressor: An Algorithm for Minimizing Firewall Policies Alex X. Liu Eric Torng Chad R. Meiners Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824,
A semantic based tool for firewall configuration
A semantic based tool for firewall configuration (Extended abstract) P. Adão SQIG IT, Instituto de Telecomunicações and Instituto Superior Técnico, Universidade de Lisboa, Portugal Email: [email protected]
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
Integrated management of network and security devices in IT infrastructures.
Integrated management of network and security devices in IT infrastructures. Bart Vanbrabant, Wouter Joosen {bart.vanbrabant, wouter.joosen}@cs.kuleuven.be DistriNet, Dept. of Computer Science, K.U.Leuven,
A Pattern Language for Firewalls
A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Larrondo-Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton,
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
How To Write A Privacy Preserving Firewall Optimization Protocol
Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.1, No.2 (2011), pp. 93-100 http://dx.doi.org/10.14257/ajmscahs.2011.12.06 Secure Multi-Party Computation in
Network-Security-Policy Analysis
Network-Security-Policy Analysis Christian Pitscheider Dip. di Automatica e Informatica Politecnico di Torino Torino, Italy [email protected] Abstract Computer network security is the first
FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.279
Analysis of Policy Anomalies on Distributed Network Security Setups
Analysis of Policy Anomalies on Distributed Network Security Setups J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France {Frederic.Cuppens,Nora.Cuppens}@enst-bretagne.fr
SPML: A Visual Approach for Modeling Firewall Configurations
SPML: A Visual Approach for Modeling Configurations Kleber Manrique Trevisani and 2 Rogério Eduardo Garcia Universidade do Oeste Paulista Faculdade de Informática de Presidente Prudente, Rua José Bongiovani,
Design and Implementation of Firewall Policy Advisor Tools
Design and Implementation of Firewall Policy Advisor Tools Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems
Packet Filtering Rule List Analysis
Filtering List Analysis Chotipat Pornavalai and Thawatchai Chomsiri Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang Ladkrabang, Bangkok 10520, Thailand. Abstract: Firewalls
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
Specifications of A High-level Conflict-Free Firewall Policy Language for Multi-domain Networks
Specifications of A High-level Conflict-Free Firewall Policy Language for Multi-domain Networks Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher School of Computer Science, Telecommunications
Firewall Policy Diagram: Structures for Firewall Behavior Comprehension
International Journal of Network Security, Vol.7, No., PP.5-59, 5 Firewall Policy Diagram: Structures for Firewall Behavior Comprehension Patrick G. Clark and Arvin Agah (Corresponding author: Patrick
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
TD 271 Rev.1 (PLEN/15)
INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:
Firewall and Its Policies Management
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Factors to Consider When Designing a Network
Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
A Matrix Model for Designing and Implementing Multi-firewall Environments
A Matrix Model for Designing and Implementing Multi-firewall Environments Loye L. Ray Department of Cyber Security and Information Assurance, University of Maryland University College, 3501 University
Improving Distributed Firewalls Performance through Vertical Load Balancing
Improving Distributed Firewalls Performance through Vertical Load Balancing Olivier Paul GET/INT, LOR Department, 91000 Evry, France [email protected] Abstract. In this paper we present an extension
(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/24 (2006.01)
(19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 231 74 B1 (4) Date of publication and mention of the grant of the patent: 16.03.11 Bulletin 11/11 (1) Int Cl.: H04L 29/06 (06.01) H04L 12/24 (06.01) (21)
