2012
DOI: 10.1007/978-3-642-34883-9_22
|View full text |Cite
|
Sign up to set email alerts
|

Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 4 publications
0
18
0
Order By: Relevance
“…Chomsiri et al have further studied firewall rules' problems, and published their interesting findings in [3] and [4]. They proposed a Tree-rule firewall to overcome these problems.…”
Section: Background Of Tree-rule Firewallmentioning
confidence: 99%
See 1 more Smart Citation
“…Chomsiri et al have further studied firewall rules' problems, and published their interesting findings in [3] and [4]. They proposed a Tree-rule firewall to overcome these problems.…”
Section: Background Of Tree-rule Firewallmentioning
confidence: 99%
“…On the other hand, redundant rules cause latency in traffic processing and lower the throughput of a network due to the undesirable waste of time on verifying against these rules. The detailed discussion of these problems can be found in our previous work published in [3].…”
Section: Introductionmentioning
confidence: 99%
“…Users can select attributes that they want for each column before creating tree rules [9]. For example, if we focus the protection on servers inside our network, we should select Destination IP to be the root node [10,13].…”
Section: 1) Implementing a Tree-rule Firewall A) Tree-rule Firewallmentioning
confidence: 99%
“…This method gives a low performance compared to other searching algorithms. Apart from the speed problem, the traditional firewalls suffer rule conflicts, caused by shadowed rules and redundant rules [4][5] [6] [7], especially the shadowed rules. A shadowed rule is a rule which cannot be matched with any packets because all packets are already matched with other rules above it.…”
Section: Introductionmentioning
confidence: 99%