2014
DOI: 10.1049/iet-ifs.2011.0146
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic rule and rule‐field optimisation for improving firewall performance and security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…It can be deployed on top of any filtering mechanism to prefilter unwanted expensive traffic. Some other work such as [11] perform reordering of rules and rules fields based on the calculation of the histograms of packet matching rules. In [12], a splay tree firewall is proposed to handle packet rejection and acceptance and can perform splay filters reordering based on a statistical model that utilizes traffic characteristic.…”
Section: Filtering Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…It can be deployed on top of any filtering mechanism to prefilter unwanted expensive traffic. Some other work such as [11] perform reordering of rules and rules fields based on the calculation of the histograms of packet matching rules. In [12], a splay tree firewall is proposed to handle packet rejection and acceptance and can perform splay filters reordering based on a statistical model that utilizes traffic characteristic.…”
Section: Filtering Techniquesmentioning
confidence: 99%
“…That will cover layer-3 and layer-4 headers and also application layer payload, when l7-filter is used. Indeed, diverse researches on functional enhancements for efficient traffic filtering have already been provided in the state of the art [9][10][11][12]. However, there is still a lack of filtering mechanisms able to perform traffic filtering in multicarrier and mobility scenarios for IoT traffic, being able to deal with the encapsulation requirements imposed by both edge and core network segments of the 5G multitenant networks, capable of performing traffic filtering and deep packet inspection in NB-IoT traffic.…”
Section: Introductionmentioning
confidence: 99%
“…The idea of packet filtering optimisation through early packet rejection and acceptance is introduced in [8–13]. In [8, 9], the proposed field value set cover (FVSC) technique builds a number of rejection rules that are examined before normal filtering.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Thus, policy Boolean expression relaxation (PBER) technique in [10] is introduced, where binary decision diagrams is used to implement the Boolean expression of the policy acceptance space. In our previous works [11–13], we introduced the idea of early rejection through optimising the order of the rule‐fields. At the end of each traffic window, histogram statistics are collected for packet matching rules and packet not matching rule‐fields.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation