Dimension-independent Table-based Firewalls

نویسندگان

  • Jay Ligatti
  • Chris Gage
چکیده

A firewall matches network packets to applicable policy rules based on packet dimensions (i.e., packet fields such as source and destination IP addresses). The efficiency with which firewalls match packets to rules plays a major role in determining a firewall’s overall efficiency and resistance to flooding-based denial-of-service (DoS) attacks. However, publicly available firewalls perform rule matching with an inefficient, though simple, linear algorithm. The linearsearch algorithm traverses through the firewall’s rule base, one rule at a time, until finding an applicable rule for the given network packet or until exhausting the rule base. The linear-search algorithm is inefficient for mediumand large-sized rule bases. This paper proposes a more efficient, but only slightly more complicated, firewall rule-search algorithm based on statically prepared tables and bit arrays. Each statically prepared table maps a number of packet bits (which do not necessarily correspond to a packet dimension) to a bit array that indicates which rules apply for those packet bits. The firewall determines which rules apply for an entire packet by intersecting the sets of rules that apply for each piece of packet data. We analyze and evaluate our dimension-independent table-based algorithm. We provide techniques that firewalls can use to automatically calculate the optimal number and sizes of lookup tables within given space constraints. Our analysis and experiments confirm that dimensionindependent table-based firewalls are more efficient, and significantly more robust during DoS attacks, than either linear-search firewalls or dimension-dependent table-based firewalls.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Secured Firewalls for Software Defined Networks

Software-Defined Networking (SDN) offers programmers network-wide visibility and direct control over the underlying switches from a logically-centralized controller. SDN provides a promising way for the future development of Internet. SDN, however, also has some new security challenges. A critical challenge among them is how to build a reliable firewall application for SDN. Due to the stateless...

متن کامل

Policy based access control framework for large networks

Efforts of this paper focus on the issues about management and throughput of firewalls (or screening routers) applied in transit networks. On the one hand, manual configuration of large amount of firewalls distributed in many access points can not meet the global security requirements in the open and dynamic environment. On the other hand, the ordinal lookup of filtering rules in each individua...

متن کامل

Fault Mode Analyze of Power System Based on Data Mining

On power system operation status monitoring, operating performance analysis and assessment is to ensure the safe operation of its important components. This paper presents a new type of data mining based on the fault mode analysis and the fast diagnostic reasoning algorithm. Fault appearance to be collected and cleaned up in a fault information dimension table, the relationship rule dimension t...

متن کامل

Why is the Star Schema a Good Data

Database design for data warehouses is based on the notion of the snowwake schema and its important special case, the star schema. The snowwake schema represents a dimensional model which is composed of a central fact table and a set of constituent dimension tables which can be further broken up into subdimension tables. We formalise the concept of a snowwake schema in terms of an acyclic datab...

متن کامل

Algorithms for Analysing Firewall and Router Access Lists

Network firewalls and routers use a rule database to decide which packets will be allowed from one network onto another. By filtering packets the firewalls and routers can improve security and performance. However, as the size of the rule list increases, it becomes difficult to maintain and validate the rules, and lookup latency may increase significantly. Ordered binary decision diagrams (BDDs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008