2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2019
DOI: 10.23919/softcom.2019.8903718
|View full text |Cite
|
Sign up to set email alerts
|

Optimization of Parallel Firewalls Filtering Rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Therefore, the ACN is considered a valuable factor for anomaly detection from a rule's definition perspective. Similar anomalies may be distinguishable by the absence of the OpCode value and numbering plan alterations for attacking subscribers [34]. From Fig.…”
Section: Detect Malformed and Inconsistency In Parameters Between Layers A Using Malformed Parameters Check Rulementioning
confidence: 64%
See 2 more Smart Citations
“…Therefore, the ACN is considered a valuable factor for anomaly detection from a rule's definition perspective. Similar anomalies may be distinguishable by the absence of the OpCode value and numbering plan alterations for attacking subscribers [34]. From Fig.…”
Section: Detect Malformed and Inconsistency In Parameters Between Layers A Using Malformed Parameters Check Rulementioning
confidence: 64%
“…Recommendations and evidence to date show that using the MAP OpCode alone is sufficient to apply rules to such MAP messages. However, it is anticipated that the ACN may provide the environment to carry out different attacks by malformed it or even removing it from the message parameters [34]. Therefore, the ACN is considered a valuable factor for anomaly detection from a rule's definition perspective.…”
Section: Detect Malformed and Inconsistency In Parameters Between Layers A Using Malformed Parameters Check Rulementioning
confidence: 99%
See 1 more Smart Citation
“…In [24] a similar architecture was proposed focusing on fault-tolerant implementation and algorithms for load distribution. Finally, in [25] a technique was described to distribute both rules and packets among parallel firewalls while maintaining the network security integrity. This solution first preprocesses rules to eliminate their dependencies and translates the firewall sequence to include only accept actions.…”
Section: ) Parallel Architecturesmentioning
confidence: 99%
“…Intra-firewall contributions appeared in the literature include, for instance, (optimal) rule ordering [14]- [18], firewall compression [19], [20] and rule analysis [21], [22]. Interfirewall alternatives are frequently based on special architectures such as parallel firewalls [23]- [25]; another approach leverages the transfer of filtering rules among firewalls located in the same network [26], [27].…”
Section: Introductionmentioning
confidence: 99%