Firewall Compressor: An Algorithm for Minimizing Firewall Policies



Similar documents
Firewall Compressor: An Algorithm for Minimizing Firewall Policies

An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization

ACL Based Dynamic Network Reachability in Cross Domain

Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain

II. BASICS OF PACKET FILTERING

Keywords Firewall, Network security, Stateful filtering,

Firewall Policy Change-Impact Analysis

Protocols. Packets. What's in an IP packet

On the effect of forwarding table size on SDN network utilization

Analysis of ACL in ASA Firewall

Survey on Geometric Efficient Matching Algorithm for Firewall

Firewalls. Ahmad Almulhem March 10, 2012

Efficiently Managing Firewall Conflicting Policies

How to Configure Windows Firewall on a Single Computer

BW-EML SAP Standard Application Benchmark

Server Load Prediction

Ethernet Fabric Requirements for FCoE in the Data Center

Technology Overview. Class of Service Overview. Published: Copyright 2014, Juniper Networks, Inc.

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

How To Configure Virtual Host with Load Balancing and Health Checking

Voice Over IP Performance Assurance

Cisco Application Networking for IBM WebSphere

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH ADOBE ACROBAT CONNECT PROFESSIONAL

How To Set Up Foglight Nms For A Proof Of Concept

LIST OF FIGURES. Figure No. Caption Page No.

Algorithms for Advanced Packet Classification with Ternary CAMs

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005

Multipath TCP design, and application to data centers. Damon Wischik, Mark Handley, Costin Raiciu, Christopher Pluntke

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

Architecture of distributed network processors: specifics of application in information security systems

High Performance Cluster Support for NLB on Window

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Steelcape Product Overview and Functional Description

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

EFFICIENT DATA STRUCTURES FOR LOCAL INCONSISTENCY DETECTION IN FIREWALL ACL UPDATES

NAMD2- Greater Scalability for Parallel Molecular Dynamics. Presented by Abel Licon

Image Compression through DCT and Huffman Coding Technique

MOBILITY AND MOBILE NETWORK OPTIMIZATION

Cisco Integrated Services Routers Performance Overview

How To Set Up Mybpx Security Configuration Guide V1.2.2 (V1.3.2) On A Pc Or Mac)

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES

Network traffic: Scaling

Definition of a White Box. Benefits of White Boxes

Firewall Verification and Redundancy Checking are Equivalent

6.2 Permutations continued

Multi-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino.

IP Office Technical Tip

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Firewall Queries. Austin, Texas , U.S.A. {alex, 2 Department of Computer Science, Texas State University,

Deployment Guide AX Series for Palo Alto Networks Firewall Load Balancing

Cisco Application Networking for BEA WebLogic

FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

Chapter 2 Data Storage

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example

Configuration Notes 0215

Stateful Firewalls. Hank and Foo

Methods for Firewall Policy Detection and Prevention

Quality of Service (QoS)) in IP networks

Additional Information: A link to the conference website is available at:

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Open Source Firewall

A Cloud Data Center Optimization Approach Using Dynamic Data Interchanges

Data Compression and Deduplication. LOC Cisco Systems, Inc. All rights reserved.

Offline sorting buffers on Line

HP Load Balancing Module

- Introduction to PIX/ASA Firewalls -

Juniper Networks Management Pack Documentation

Lesson 5-3: Border Gateway Protocol

Design of PSTN-VoIP Gateway with inbuilt PBX & SIP extensions for wireless medium

lightning wire labs Hardware Appliances

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

Project Management Planning

Optimizing Converged Cisco Networks (ONT)

Saisei FlowCommand FLOW COMMAND IN ACTION. No Flow Left Behind. No other networking vendor can make this claim

Policy Distribution Methods for Function Parallel Firewalls

Measurement Study of Wuala, a Distributed Social Storage Service

Configuring NetFlow Secure Event Logging (NSEL)

Enterprise Application Performance Management: An End-to-End Perspective

Transcription:

Firewall Compressor: An Algorithm for Minimizing Firewall Policies Alex Liu, Eric Torng, Chad Meiners Department of Computer Science Michigan State University {alexliu,torng,meinersc}@cse.msu.edu

Introduction Internet Software Based ACL ` Packet 1.2.3.123 192.168.0.1 6500 65535 TCP Rule SIP DIP S Port D Port Protocol Action 1 1.2.3.0/24 192.168.0.1 0 * * discard 2 1.2.3.0/24 192.168.0.1 65535 * * discard 3 1.2.3.0/24 192.168.0.1 * 0 * discard 4 1.2.3.0/24 192.168.0.1 * 65535 * discard 5 1.2.3.0/24 192.168.0.1 [0,65535] [0,65535] TCP accept 6 * * * * * discard 2/20

Firewall Minimization Problem Given a firewall f1 as a sequence of rules Generate smallest equivalent firewall f2 r 1 20-40 30-50 accept r 2 20-40 1-29 discard r 3 20-40 51-100 discard r 4 60-80 30-50 accept r 5 60-80 1-29 discard r 6 60-80 51-100 discard r 7 1-19 1-100 discard r 8 41-59 1-100 discard Firewall Compressor r 1 41-59 1-100 discard r 2 20-80 30-50 accept r 3 1-100 1-100 discard Rule order will change (r 1 is a discard) Rules will be merged (r 1 -r 4 => r 1 -r 2 ) 3/20

Motivation Improve performance by reducing per-packet delay Use cheaper hardware NetScreen-100 has a hard limit of 733 rules r 1 20-40 30-50 accept r 2 20-40 1-29 discard r 3 20-40 51-100 discard r 4 60-80 30-50 accept r 5 60-80 1-29 discard r 6 60-80 51-100 discard r 7 1-19 1-100 discard r 8 41-59 1-100 discard Firewall Compressor r 1 41-59 1-100 discard r 2 20-80 30-50 accept r 3 1-100 1-100 discard 4/20

Solution Solve Firewall minimization problem for single field firewalls Optimal solution Generalize single field solution to multiple field firewalls Greedy non-optimal solution Related Work TCAM Based Solution TCAM Razor [ICNP 2007] Dong et. al. [SIGMETRICS 2006] Faster software classifiers Trade memory for speed Require specific classification algorithm 5/20

Single Field Firewalls decompose rescheduling (A) (B) (C) 41 60 21 55 45 80 1 65 75 100 41 60 21 40 61 80 1 20 81 100 41 60 21 80 1 100 A. Our input is a series of intervals rules Each color is a decision B. Decompose rules into atomic intervals Rules can be any order now C. Reschedule intervals to merge them effectively Last rule is always the entire interval 6/20

Key Observation Possible Last Rules We can safely assume that the leftmost (or rightmost) interval is part of the last rule in an optimal rule list 7/20

Problem Decomposition We find a minimal list by discovering where the leftmost interval is paid for in the sub-solution(s) We have two cases to consider This can be done in polynomial time with DP Decisions can be weighted 8/20

Case 1 Leftmost interval is the only interval that is uniquely covered by the last rule The minimal rule list is the size of the of the minimal sub-solution plus the leftmost interval 9/20

Case 2 Leftmost interval is not the only interval that is uniquely covered by the last rule We need to find the sub-solution that cost shares with the leftmost interval We extend the correct sub-solution to cost share 10/20

From Single to Multiple Dimensions Break the problem into sub problems Decompose into 1-D problems Firewall Decision Diagrams Provides Decomposition hierarchy 20-40 60-80 F 1 v 1 1-19 41-59 81-100 v 2 v 3 30-50 F 2 F 2 1-29 51-100 1-100 a d d 11/20

Multi-Field Minimization Work from the bottom up Expand rules as we go r 1 41-50 v 1-100 3 discard r 21 20-80 v30-50 2 accept v 2 r 322 20-80 1-100 v1-100 3 discard v 3 r 3 1-100 1-100 discard v 3 F r 1 30-50 accept 1-19 20-40 r 41-59 2 1-100 discard r 60-80 1 1-100 discard 81-100 v 2 v 3 30-50 1 F 2 F 2 1-29 51-100 v 1 1-100 a d d 12/20

Redundancy Removal We apply redundancy removal to finish r11 41-50 1-100 discard r21 20-80 30-50 accept r22 20-80 1-100 discard r31 1-100 1-100 discard r11 41-50 1-100 discard r21 20-80 30-50 accept r31 1-100 1-100 discard 13/20

Experimental Results Real-life Packet Classifiers 17 structurally distinct classifiers 42 actual classifiers A few rules to hundreds of rules Synthetic Packet Classifiers Test scalability Randomly generated set of field ranges Cross product of sets 14/20

Experimental Metrics For a set of classifiers S Average Compression ratio over S f S (FC(f)/ f ) / S Total Compression ratio over S f S (FC(f)) / f S ( f ) FC(f) is the number of rule produced by running firewall compression on f 15/20

Experimental Factors Field Ordering FDD field order results in a substantial difference 5! = 120 permutations Fortunately there are good permutations 20-40 60-80 F 1 v 1 1-19 41-59 81-100 v 2 v 3 30-50 F 2 F 2 1-29 51-100 1-100 a d d 16/20

Results for Real Classifiers For most classifiers FC has significant compression FDD ordering is DIP, SIP, DP, SP, Protocol 17/20

Compression Ratio Distribution Real Classifiers Average compression 52.3% Total Compression 69.4% Synthetic Classifiers Average Compression 32.2% Total Compression 7.4% 18/20

Concluding Remarks Firewall Compressor is not optimal Better algorithms are future work Firewall Compression can result in a significant reduction in policy size Average 47.7% reduction in policy rules No hardware modification Can be used to improve existing hardware 19/20

Questions? Thank you for your attention 20/20