2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) 2015
DOI: 10.1109/rndm.2015.7325238
|View full text |Cite
|
Sign up to set email alerts
|

Detection and prevention of firewall-rule conflicts on software-defined networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Network firewalls have been extensively studied in different communication layers, such as data-link [84], [85], network [86], [87], transport [88], and application [89], [90], [91], and in different aspects, such as policy compactness [92], [93], verification [94], languages [95], conflicts [96], [97], and so on. PFIREWALL is essentially an application layer filtering system.…”
Section: Firewall-based Solutionsmentioning
confidence: 99%
“…Network firewalls have been extensively studied in different communication layers, such as data-link [84], [85], network [86], [87], transport [88], and application [89], [90], [91], and in different aspects, such as policy compactness [92], [93], verification [94], languages [95], conflicts [96], [97], and so on. PFIREWALL is essentially an application layer filtering system.…”
Section: Firewall-based Solutionsmentioning
confidence: 99%
“…The seminal work of Xie et al [54] introduces stateless data plane checking to which Delta-net belongs. The research that emerged from [54] can be broadly divided into offline [57,2,24,40 48,26,35,17,33] and online [27,25,55] approaches. The offline approaches encode the problem into Datalog [17,33] or logic formulas that can be checked for satisfiability by constructing a Binary Decision Diagram [57,2] or calling an SAT/SMT solver [24,40,1,34,48,23,35].…”
Section: Related Workmentioning
confidence: 99%
“…The research that emerged from [54] can be broadly divided into offline [57,2,24,40 48,26,35,17,33] and online [27,25,55] approaches. The offline approaches encode the problem into Datalog [17,33] or logic formulas that can be checked for satisfiability by constructing a Binary Decision Diagram [57,2] or calling an SAT/SMT solver [24,40,1,34,48,23,35]. By contrast, all modern online approaches [27,25,55] partition in some way the set of all network packets.…”
Section: Related Workmentioning
confidence: 99%
“…Now, we need a tool, called a verifier, able to find (calculate) the semantic function π, G and verify if that set is empty and the minimal diagnosis of that set. We use similar tools also for validating paths on network infrastructure [12], and recently we show how to use of minimal diagnosis to detect and prevent firewall-rule conflicts on software-defined networking [13].…”
Section: Definition 6 (Policy Conflict)mentioning
confidence: 99%