Academia.eduAcademia.edu

Outline

On autonomic optimization of firewall policy organization

2006, Journal of High Speed Networks

Abstract

Security policies play a critical role in many of the current network security technologies such as firewalls, IPSec and IDS devices. The configuration of these policies not only determines the functionality of such devices, but also substantially affects their performance. The optimization of filtering policy configuration is critically important to provide high performance packet filtering particularly for high speed network security.

References (30)

  1. E. Al-Shaer and H. Hamed, Modeling and management of firewall policies. IEEE Transactions on Network and Service Management 1(1) (2004), 2-10.
  2. D. Bertsimas and J. Tsitsiklis, Introduction to Linear Optimization, Athena Scientific, 1997.
  3. D. Chapman and E. Zwicky, Building Internet Firewalls, 2nd edn, Orielly & Associates Inc., 2000.
  4. E. Cohen and C. Lund, Packet classification in large ISPs: Design and evaluation of decision tree classifiers, ACM SIGMETRICS Perfor- mance Evaluation Review 33(1) (2005), 73-84.
  5. A. Feldmann and S. Muthukrishnan, Tradeoffs for packet classification, in: IEEE INFOCOM'00, 2000, pp. 1193-1202.
  6. R. Graham, E. Lawler, J. Lenstra and A. Kan, Optimization and approximation in deterministic sequencing and scheduling: A surevey, Annals of Discrete Mathematics 5 (1979), 287-326.
  7. P. Gupta and N. McKeown, Algorithms for packet classification, IEEE Network 15(2) (2001), 24-32.
  8. P. Gupta and N. McKeown, Packet classification using hierarchical intelligent cuttings, in: ACM SIGCOMM, 1999, pp. 147-160.
  9. P. Gupta, B. Prabhakar and S. Boyd, Near optimal routing lookups with bounded worst case performance, in: IEEE INFOCOM'00, 2000, pp. 1184-1192.
  10. H. Hamed and E. Al-Shaer, Dynamic rule-ordering optimization for high-speed firewall filtering, in: ACM AsiaCCS'06, 2006.
  11. H. Hamed, A. El-Atawy and E. Al-Shaer, Adaptive statistical optimization techniques for firewall packet filtering, Technical Report CTI-TR-05-012, DePaul University, 2005.
  12. D. Knuth, Fundamental Algorithms, Volume 1 of The Art of Computer Programming, 3rd edn, Addison-Wesley, Reading, MA, 1997.
  13. K. Lan and J. Heidemann, On the correlation of Internet flow characteristics, Technical Report ISI-TR-574, USC/ISI, 2003.
  14. E. Lawler, Sequencing jobs to minimize total weighted completion time subject to precedence constraints, Annals of Discrete Mathematics 2 (1978), 75-90.
  15. J. Lenstra and A. Kan, Complexity of scheduling under precendence constraints, Operations Research 26(1) (1978).
  16. D. MacKay, Information Theory, Inference, and Learning Algorithms, 2nd edn, University of Cambridge, 2003.
  17. A.J. McAulay and P. Francis, Fast routing table lookup using CAMs, in: IEEE INFOCOM'93, 1993, pp. 1382-1391.
  18. J. Qian, S. Hinrichs and K. Nahrstedt, ACLA: A framework for access control list (ACL) analysis and optimization, in: IFIP Communi- cations and Multimedia Security, 2001, p. 4.
  19. R. Rivest, On self-organizing sequential search heuristics, Communications of the ACM 19(2) (1976), 63-67.
  20. A. Schulz, Scheduling to minimize total weighted completion time: Performance guarantees of LP-based heuristics and lower bounds, in: The 5th International IPCO Conference, 1996, pp. 301-315.
  21. V. Srinivasan, S. Suri and G. Varghese, Packet classification using tuple space search, in: ACM SIGCOMM Communication Review, 1999, pp. 135-146.
  22. Cisco Systems, Optimizing ACLs. User Guide for ACL Manager 1.4, CiscoWorks2000, 2002.
  23. Cisco Systems, Netflow services solutions guide, October 2004.
  24. D. Taylor and J. Turner, Scalable packet classification using distributed crossproducting of field labels, in: IEEE INFOCOM, 2005, pp. 1-12.
  25. SimJava v2.0, Process based discrete event simulation package for java, http://www.dcs.ed.ac.uk/home/hase/simjava/, 2002.
  26. J. Wallerich, H. Dreger, A. Feldmann, B. Krishnamurthy and W. Willinger, A methodology for studying persistency aspects of Internet flows, ACM SIGCOMM Computer Communication Review 35 (2005), 23-36.
  27. T.Y.C. Woo, A modular approach to packet classification: Algorithms and results, in: IEEE INFOCOM'00, 2000, pp. 1213-1222.
  28. A. Wool, A quantitative study of firewall configuration errors, IEEE Computer 37(6) (2004), 62-67.
  29. L. Zhang, Virtual clock: A new traffic control algorithm for packet switching networks, in: The ACM symposium on Communications Architectures and Protocols, 1990, pp. 101-124.
  30. G. Zipf, Human Behaviour and the Principle of Least-Effort, Addison-Wesley, 1949.