Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications 2006
DOI: 10.1109/infocom.2006.129
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Statistical Optimization Techniques for Firewall Packet Filtering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
32
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 63 publications
(33 citation statements)
references
References 18 publications
1
32
0
Order By: Relevance
“…The idea of early attack packet rejection was introduced in [2, 17 and 18]. In [2], FVSC approach is proposed to optimize the rejection path in a small rule set, with low diversity of field values. PBER technique in [18] is considered as a generalization of FVSC [2] in the sense that FVSC [2] focuses only on rejection path while PBER [18] finds short cuts for both accepted and rejected packets.…”
Section: Related Workmentioning
confidence: 99%
“…The idea of early attack packet rejection was introduced in [2, 17 and 18]. In [2], FVSC approach is proposed to optimize the rejection path in a small rule set, with low diversity of field values. PBER technique in [18] is considered as a generalization of FVSC [2] in the sense that FVSC [2] focuses only on rejection path while PBER [18] finds short cuts for both accepted and rejected packets.…”
Section: Related Workmentioning
confidence: 99%
“…They presented techniques, algorithms and evaluation study to tackle each problem effectively [7]. K. Salah presented an analytical model to study and analyze the performance of rule based firewall.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we use the basic entropy formula as described in [5], [3], to show how much skewness (predictability) exists in future data from that source. We define "the skewness factor S f of a filtering field f is a value between 0 (for a nonskewed or uniform distribution) and 1 (for a totally skewed distribution).…”
Section: A Measuring Skewness In Traffic Distributionmentioning
confidence: 99%
“…The clear difference in skewness measure of various traffic and field values between spam and benign traffic is used as fingerprinting for spambots. The skewness distribution of Internet traffic was exploited to enhance filtering in [5], [4].…”
Section: A Measuring Skewness In Traffic Distributionmentioning
confidence: 99%