2015
DOI: 10.5120/21857-5178
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Technique for Effective Optimization of Cross Domain Network Protocol for Redundancy Removal in Firewall Policies

Abstract: In today's rapidly progressing professional world, internet is being used as a medium for almost every operation. Firewalls are extensively implemented to prevent unauthorized access to concealed networks and secure them. Based upon the applied policies a firewall can approve or decline the data packet by scrutinizing them. The large size and intricacy of modern networks result in big and complex firewall policies. Optimizing these policies is crucial for network performance inflation. Existing system facilita… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Surprisingly, there is still work being done in the area of firewall misconfiguration and correction on stateless firewalls. Just to list a few, References [5,7,12,40,56,63] all discuss detection of misconfigurations on stateless firewalls. Despite firewalls advancing to be more complex than in the days of simple filtering, the research done into stateless firewalls has not stopped.…”
Section: Challenges and Research Trends 41 Stateless Vs Statefulmentioning
confidence: 99%
“…Surprisingly, there is still work being done in the area of firewall misconfiguration and correction on stateless firewalls. Just to list a few, References [5,7,12,40,56,63] all discuss detection of misconfigurations on stateless firewalls. Despite firewalls advancing to be more complex than in the days of simple filtering, the research done into stateless firewalls has not stopped.…”
Section: Challenges and Research Trends 41 Stateless Vs Statefulmentioning
confidence: 99%
“…for each C j in C one do 6: if C i = C j then 7: conum = conum + 1 8: end if 9: end for 10: end for 11: if conum = i then 12 the algorithm for the equivalent redundancy rules and implication redundancy rules and with the scale of n, every rule will be judged whether it should be reducted. And when judging one rule every rules in the rule base should be compared with that rule.…”
Section: Inputmentioning
confidence: 99%