SlideShare a Scribd company logo
1 of 7
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 261
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Interfirewall optimization across various administrative domain for
enabling security and privacy preserving
Kalaivani.M1
, Rohini.R2
1,2
Department of CSE, Vivekanandha College of Engineering for Women,
Abstract— Network security is usually protected by a firewall, which checks in-out packets against
a set of defined policies or rules. Hence, the overall performance of the firewall generally depend on
its rule management. For example, the performance can be decreased when there are firewall rule
anomalies. The anomalies may happen when two sets of firewall rules are overlapped or their
decision parts are both an acceptance and a denial simultaneously. Firewall optimization focuses on
either inter-firewall or intra-firewall optimization within one administrative domain where the
privacy of firewall policies is not a concern. Explore interfirewall optimization across administrative
domain for the first time. The key technical challenge is that firewall policy cannot be shared across
domains because a firewall policy contains confidential information and even potential security
holes, which can be exploited by attackers. Using interfirewall redundant rule which overcome the
prior problem and enable the interfirewall optimization across administrative domains. Also propose
the first cross domain cooperative firewall (CDCF) policy optimization protocol. The optimization
process involves cooperative computation between the two firewall without any party disclosing its
policy to the other.
Keywords- Interfirewall optimization, Redundancy Removal algorithm.
I. INTRODUCTION
Network security is usually protected by a firewall, which checks in-out packets against a set
of defined policies or rules. Hence, the overall performance of the firewall generally depends on its
rule management. For example, the performance can be decreased when there are firewall rule
anomalies. The anomalies may happen when two sets of firewall rules are overlapped or their
decision parts are both an acceptance and a denial simultaneously. In this paper, we propose a new
paradigm of the firewall design, consisting of two parts:
(1)Single Domain Decision firewall (SDD) -a new firewall rule management policy that is
certainly not conflicts.
(2)The Binary Tree Firewall (BTF) -a data structure and an algorithm to fast check the
firewall rules.
Experimental results have indicated that the new design can fix conflicting anomaly and
increase the speed of firewall rule checking from O(N2
) to O(log2 N).
A firewall is a network security system that controls the incoming and outgoing network
traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal
network and another network (e.g., the internet) that is assumed not to be secured and trusted.
Firewall exist both as a software solution and a hardware appliance.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 262
Figure1.Architecture of firewall
Firewalls are critical in securing private network of business, institutions, and home
networks. A firewall is often placed at the entrance between a private network and the external
network so that it can check each incoming and outgoing packet and decide whether to accept or
discard the packet based on its policy. A firewall policy is usually specified as a sequence of rules,
called Access Control List (ACL), and each rule has the predicate over multiple packed header
fields.
i) Source IP
ii) Destination IP
iii)Source port
iv)Destination port
v) Protocol type
The rule in a firewall policy typically follows the first-match semantics, whether the decision
of the packet matches in the policy. Each physical interface of a router/firewall is configured with
two ACLs:
1. One for filtering outgoing packets.
2. Other one for filtering incoming packets.
The number of rules in a firewall significantly affects its throughput. Unfortunately, with the
explosive growth of services deployed on the internet, firewall policies are growing rapidly in size.
Thus, optimizing firewall policy is crucial for improving network performance. The firewall
optimization focuses on either inter-firewall or intra-firewall optimization within one administrative
domain where the privacy of firewall policy is not a concern. Inter-firewall optimization means
optimizing a single firewall. Firewall can protect against some problems (virus and attacks) that
come from the internet. That can’t protect against viruses that come from infected media (like an
infected office documents on an USB flash drive).
II. RELATED WORK
Various researches have been reported in this related work based on optimization of firewall
rules and policies.
Managing firewall rules particularly in multi-firewall enterprise network. To identify all
anomalies exist in a single and a multi-firewall environment. It automatically discovers the policy
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 263
anomalies in centralized and distributed firewall. The tool implements the “interfirewall and intra-
firewall anomaly discovery algorithms”, as well as the distributed “firewall policy editor”
Oblivious membership verification [2] technique is used for rules in a firewall is redundant.
So that they are using “redundancy checking algorithm” that is mainly used for verifying whether the
rules in a firewall accept discard an intended set of packets.
“Firewall compressor algorithm” is used for compressing both one-dimensional and multi-
dimensional firewall. They uses optimal algorithm such as dynamic programming technique for
compressing one-dimensional firewall and systematic approach for multi-dimensional firewall
compression.
Digital signature technique is a mathematical technique used to validate the authentication
and integrity of a software or digital document. Digital signature is mainly based on public key
cryptography also called as asymmetric cryptography. That uses public key algorithm such as RSA,
it generates two keys (one private key and one public key) that are mathematically linked.
They propose the VGuard a framework which allows a policy owner and request owner to
collaboratively determine whether the request satisfies the policy without the policy owner knowing
the request and the request owner knowing the policy. They also use the efficient protocol called as
Xhash, that is used for oblivious comparison, for allowing two parties where each party has a
number, to compare whether they have same number without disclosing their numbers to each other.
III.PROPOSED ALGORITHM
Firewalls have been commonly implemented over the internet for securing individual
network. A firewall checks each and every incoming and outgoing packet to decide whether to
accept or discard them based upon its policy. Optimization of firewall policy is essential for
improving network performance. It explores interfirewall optimization across various administrative
domains for the first and foremost time. The challenge is that firewall policy cannot be disclosed
over the different domains, because a firewall policy contains private information and even potential
security holes, which can pave way to the attackers to launch attacks. In firewall the similarity join
consist of grouping pairs of records whose similarities greater then a threshold, privacy preserving
algorithm for similarity join are used to protect the data of two sources from being totally disclosed
during the similarity join process.
3.1. Algorithm Overview
My proposed algorithm is “Redundancy Removal algorithm”, which is mainly used for
reducing the redundant rule in the firewall with multi-rule coverage. This involves semi-honest
computation between two firewalls by preserving privacy of the each party firewall policy. To avoid
rule overhead and increase efficiency by firewall optimization. The steps involved for identifying the
redundant rules are:
3.1.1. Identical Redundancy
The identical rules that is clearly redundant. All matching columns are identical. While the
comments are different, the rule number and comments do not affect the behavior of the firewall
matching.
3.1.2. Hidden rules
Hidden rules in firewall are the rules that can’t be identified in the normal firewall policy or
rules. The hidden rules can’t check the packets and traffic from the un-trusted network. So initially
we have to identify the hidden rules in the firewall.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 264
3.1.3. Redundant rule
An inverse of hidden case is when a lower rule fully includes the higher rule criteria plus
more. While the first rule will match some traffic, you can’t get rid of the lower rule because the
lower rule would not only match what the first rule matches, but will also match additional traffic.
V. ARCHITECTURAL DIAGRAM
Optimization of firewall policy is essential for improving network performance. It explores
interfirewall optimization across various administrative domains for the first and foremost time. The
challenge is that firewall policy cannot be disclosed over the different domains, because a firewall
policy contains private information and even potential security holes, which can pave way to the
attackers to launch attacks. In firewall the similarity join consist of grouping pairs of records whose
similarities greater then a threshold, privacy preserving algorithm for similarity join are used to
protect the data of two sources from being totally disclosed during the similarity join process.
Firewalls have been commonly implemented over the internet for securing individual
network. A firewall checks each and every incoming and outgoing packet to decide whether to
accept or discard them based upon its policy.
My proposed algorithm is “Redundancy Removal algorithm”, which is mainly used for
reducing the redundant rule in the firewall with multi-rule coverage. This involves semi-honest
computation between two firewalls by preserving privacy of the each party firewall policy. To avoid
rule overhead and increase efficiency by firewall optimization.
Figure2.Firewall proposed rule set review mechanism
VI. CONCLUSION
To identify an important problem of cross-domain privacy-preserving interfirewall
redundancy detection. Implement the protocol in java and conducting extensive evolution. The result
of the real firewall policies shows that, the protocol can remove as many of the redundant rules. This
protocol is mainly applicable for identifying the interfirewall redundancy of firewall with a few
thousands of rules. However it is still expensive to compare two firewall with many thousands of
rules. Reducing complexity of the protocol is needs to be further studies. Demonstrate the rule
optimization, from FW1 to FW2, and note that a similar rule optimization is possible in the opposite
direction, i.e., FW2 to FW1.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 265
In the first scenario, FW1 toFW2, it is FW1 that is improving the performance load of FW2,
and in return FW2 is improving the performance of FW1 in a vice-versa manner. All this is being
achieved without FW1 or FW2 reveling each other’s policies thus allowing for a proper
administrative separation. This protocol is most beneficial if both parties are willing to benefit from
it and can collaborate in a mutual manner. There are many special cases that could be explored based
on the current protocol. For example, there may be host or Network Address Translator (NAT)
device between two adjacent firewalls. The current protocol cannot be directly applied to such cases.
Extending our protocol to these cases could be an interesting topic and requires further investigation.
REFERENCES
[1] nf-HiPAC, “Firewall throughput test,” 2012 [Online]. Available: http://
www.hipac.org/performance_tests/results.html
[2] R. Agrawal, A. Evfimievski, and R. Srikant, “Information sharing across private databases,” inProc. ACM
SIGMOD, 2003, pp. 86–97.
[3] E.Al-Shaer and H. Hamed, “Discovery of policy anomalies in distributed firewalls,” in Proc. IEEE INFOCOM,
2004, pp. 2605–2616.
[4] J.Brickell and V. Shmatikov, “Privacy-preserving graph algorithms in the semi-honest model,” in Proc.
ASIACRYPT, 2010, pp. 236–252.
[5] Y.-K. Chang, “Fast binary and multiway prefix searches for packet forwarding,” Comput. Netw., vol. 51, no. 3, pp.
588–605, 2007.
[6] J. Cheng, H. Yang, S. H.Wong, and S. Lu, “Design and implementation of cross-domain cooperative firewall,” in
Proc. IEEE ICNP, 2007, pp. 284–293.
[7] Q. Dong, S. Banerjee, J. Wang, D. Agrawal, and A. Shukla, “Packet classifiers in ternary CAMs can be smaller,” in
Proc. ACM SIGMETRICS, 2006, pp. 311–322.
[8] O.Goldreich, “Secure multi-party computations,” Working draft, Ver. 1.4, 2002.
[9] O.Goldreich, Foundations of Cryptography: Volume II (Basic Applications). Cambridge, U.K.: Cambridge Univ.
Press, 2004.
[10] M. G. Gouda and A. X. Liu, “Firewall design: Consistency, completeness and compactness,” in Proc. IEEE ICDCS,
2004, pp. 320–327.
[11] M. G. Gouda and A. X. Liu, “Structured firewall design,” Comput. Netw., vol. 51, no. 4, pp. 1106–1120, 2007.
[12] P. Gupta, “Algorithms for routing lookups and packet classification,” Ph.D. dissertation, Stanford Univ., Stanford,
CA, 2000.
[13] A. X. Liu and F. Chen, “Collaborative enforcement of firewall policies in virtual private networks,” in Proc. ACM
PODC, 2008, pp. 95–104.
[14] A. X. Liu and M. G. Gouda, “Diverse firewall design,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 8, pp. 1237
1251, Sep. 2008.
Interfirewall optimization across various administrative domain for enabling security and privacy preserving
Interfirewall optimization across various administrative domain for enabling security and privacy preserving

More Related Content

What's hot

Paper id 24201492
Paper id 24201492Paper id 24201492
Paper id 24201492
IJRAT
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
David Sweigert
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 

What's hot (20)

firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Paper id 24201492
Paper id 24201492Paper id 24201492
Paper id 24201492
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved Security
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Firewalls
FirewallsFirewalls
Firewalls
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
Intrusion preventionintrusion detection
Intrusion preventionintrusion detectionIntrusion preventionintrusion detection
Intrusion preventionintrusion detection
 
Firewall
FirewallFirewall
Firewall
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Firewalls
FirewallsFirewalls
Firewalls
 

Similar to Interfirewall optimization across various administrative domain for enabling security and privacy preserving

Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewall
eSAT Publishing House
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
ams1ams11
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...
eSAT Journals
 

Similar to Interfirewall optimization across various administrative domain for enabling security and privacy preserving (20)

A Novel Management Framework for Policy Anomaly in Firewall
A Novel Management Framework for Policy Anomaly in FirewallA Novel Management Framework for Policy Anomaly in Firewall
A Novel Management Framework for Policy Anomaly in Firewall
 
Dp4301696701
Dp4301696701Dp4301696701
Dp4301696701
 
PERFORMANCE EVALUATION OF ENHANCEDGREEDY- TWO-PHASE DEPLOYMENT ALGORITHM
PERFORMANCE EVALUATION OF ENHANCEDGREEDY- TWO-PHASE DEPLOYMENT ALGORITHMPERFORMANCE EVALUATION OF ENHANCEDGREEDY- TWO-PHASE DEPLOYMENT ALGORITHM
PERFORMANCE EVALUATION OF ENHANCEDGREEDY- TWO-PHASE DEPLOYMENT ALGORITHM
 
PERFORMANCE EVALUATION OF ENHANCEDGREEDY-TWO-PHASE DEPLOYMENT ALGORITHM
PERFORMANCE EVALUATION OF ENHANCEDGREEDY-TWO-PHASE DEPLOYMENT ALGORITHMPERFORMANCE EVALUATION OF ENHANCEDGREEDY-TWO-PHASE DEPLOYMENT ALGORITHM
PERFORMANCE EVALUATION OF ENHANCEDGREEDY-TWO-PHASE DEPLOYMENT ALGORITHM
 
Ch10 Firewall it-slideshares.blogspot.com
Ch10 Firewall it-slideshares.blogspot.comCh10 Firewall it-slideshares.blogspot.com
Ch10 Firewall it-slideshares.blogspot.com
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
Cross domain privacy-preserving cooperative firewall optimization
Cross domain privacy-preserving cooperative firewall optimizationCross domain privacy-preserving cooperative firewall optimization
Cross domain privacy-preserving cooperative firewall optimization
 
Traffic aware dynamic
Traffic aware dynamicTraffic aware dynamic
Traffic aware dynamic
 
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewall
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
 
Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...
Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...
Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...
 
Firewall
FirewallFirewall
Firewall
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Editor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
Editor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Interfirewall optimization across various administrative domain for enabling security and privacy preserving

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 261 e-ISSN: 2349-9745 p-ISSN: 2393-8161 Interfirewall optimization across various administrative domain for enabling security and privacy preserving Kalaivani.M1 , Rohini.R2 1,2 Department of CSE, Vivekanandha College of Engineering for Women, Abstract— Network security is usually protected by a firewall, which checks in-out packets against a set of defined policies or rules. Hence, the overall performance of the firewall generally depend on its rule management. For example, the performance can be decreased when there are firewall rule anomalies. The anomalies may happen when two sets of firewall rules are overlapped or their decision parts are both an acceptance and a denial simultaneously. Firewall optimization focuses on either inter-firewall or intra-firewall optimization within one administrative domain where the privacy of firewall policies is not a concern. Explore interfirewall optimization across administrative domain for the first time. The key technical challenge is that firewall policy cannot be shared across domains because a firewall policy contains confidential information and even potential security holes, which can be exploited by attackers. Using interfirewall redundant rule which overcome the prior problem and enable the interfirewall optimization across administrative domains. Also propose the first cross domain cooperative firewall (CDCF) policy optimization protocol. The optimization process involves cooperative computation between the two firewall without any party disclosing its policy to the other. Keywords- Interfirewall optimization, Redundancy Removal algorithm. I. INTRODUCTION Network security is usually protected by a firewall, which checks in-out packets against a set of defined policies or rules. Hence, the overall performance of the firewall generally depends on its rule management. For example, the performance can be decreased when there are firewall rule anomalies. The anomalies may happen when two sets of firewall rules are overlapped or their decision parts are both an acceptance and a denial simultaneously. In this paper, we propose a new paradigm of the firewall design, consisting of two parts: (1)Single Domain Decision firewall (SDD) -a new firewall rule management policy that is certainly not conflicts. (2)The Binary Tree Firewall (BTF) -a data structure and an algorithm to fast check the firewall rules. Experimental results have indicated that the new design can fix conflicting anomaly and increase the speed of firewall rule checking from O(N2 ) to O(log2 N). A firewall is a network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the internet) that is assumed not to be secured and trusted. Firewall exist both as a software solution and a hardware appliance.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 262 Figure1.Architecture of firewall Firewalls are critical in securing private network of business, institutions, and home networks. A firewall is often placed at the entrance between a private network and the external network so that it can check each incoming and outgoing packet and decide whether to accept or discard the packet based on its policy. A firewall policy is usually specified as a sequence of rules, called Access Control List (ACL), and each rule has the predicate over multiple packed header fields. i) Source IP ii) Destination IP iii)Source port iv)Destination port v) Protocol type The rule in a firewall policy typically follows the first-match semantics, whether the decision of the packet matches in the policy. Each physical interface of a router/firewall is configured with two ACLs: 1. One for filtering outgoing packets. 2. Other one for filtering incoming packets. The number of rules in a firewall significantly affects its throughput. Unfortunately, with the explosive growth of services deployed on the internet, firewall policies are growing rapidly in size. Thus, optimizing firewall policy is crucial for improving network performance. The firewall optimization focuses on either inter-firewall or intra-firewall optimization within one administrative domain where the privacy of firewall policy is not a concern. Inter-firewall optimization means optimizing a single firewall. Firewall can protect against some problems (virus and attacks) that come from the internet. That can’t protect against viruses that come from infected media (like an infected office documents on an USB flash drive). II. RELATED WORK Various researches have been reported in this related work based on optimization of firewall rules and policies. Managing firewall rules particularly in multi-firewall enterprise network. To identify all anomalies exist in a single and a multi-firewall environment. It automatically discovers the policy
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 263 anomalies in centralized and distributed firewall. The tool implements the “interfirewall and intra- firewall anomaly discovery algorithms”, as well as the distributed “firewall policy editor” Oblivious membership verification [2] technique is used for rules in a firewall is redundant. So that they are using “redundancy checking algorithm” that is mainly used for verifying whether the rules in a firewall accept discard an intended set of packets. “Firewall compressor algorithm” is used for compressing both one-dimensional and multi- dimensional firewall. They uses optimal algorithm such as dynamic programming technique for compressing one-dimensional firewall and systematic approach for multi-dimensional firewall compression. Digital signature technique is a mathematical technique used to validate the authentication and integrity of a software or digital document. Digital signature is mainly based on public key cryptography also called as asymmetric cryptography. That uses public key algorithm such as RSA, it generates two keys (one private key and one public key) that are mathematically linked. They propose the VGuard a framework which allows a policy owner and request owner to collaboratively determine whether the request satisfies the policy without the policy owner knowing the request and the request owner knowing the policy. They also use the efficient protocol called as Xhash, that is used for oblivious comparison, for allowing two parties where each party has a number, to compare whether they have same number without disclosing their numbers to each other. III.PROPOSED ALGORITHM Firewalls have been commonly implemented over the internet for securing individual network. A firewall checks each and every incoming and outgoing packet to decide whether to accept or discard them based upon its policy. Optimization of firewall policy is essential for improving network performance. It explores interfirewall optimization across various administrative domains for the first and foremost time. The challenge is that firewall policy cannot be disclosed over the different domains, because a firewall policy contains private information and even potential security holes, which can pave way to the attackers to launch attacks. In firewall the similarity join consist of grouping pairs of records whose similarities greater then a threshold, privacy preserving algorithm for similarity join are used to protect the data of two sources from being totally disclosed during the similarity join process. 3.1. Algorithm Overview My proposed algorithm is “Redundancy Removal algorithm”, which is mainly used for reducing the redundant rule in the firewall with multi-rule coverage. This involves semi-honest computation between two firewalls by preserving privacy of the each party firewall policy. To avoid rule overhead and increase efficiency by firewall optimization. The steps involved for identifying the redundant rules are: 3.1.1. Identical Redundancy The identical rules that is clearly redundant. All matching columns are identical. While the comments are different, the rule number and comments do not affect the behavior of the firewall matching. 3.1.2. Hidden rules Hidden rules in firewall are the rules that can’t be identified in the normal firewall policy or rules. The hidden rules can’t check the packets and traffic from the un-trusted network. So initially we have to identify the hidden rules in the firewall.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 264 3.1.3. Redundant rule An inverse of hidden case is when a lower rule fully includes the higher rule criteria plus more. While the first rule will match some traffic, you can’t get rid of the lower rule because the lower rule would not only match what the first rule matches, but will also match additional traffic. V. ARCHITECTURAL DIAGRAM Optimization of firewall policy is essential for improving network performance. It explores interfirewall optimization across various administrative domains for the first and foremost time. The challenge is that firewall policy cannot be disclosed over the different domains, because a firewall policy contains private information and even potential security holes, which can pave way to the attackers to launch attacks. In firewall the similarity join consist of grouping pairs of records whose similarities greater then a threshold, privacy preserving algorithm for similarity join are used to protect the data of two sources from being totally disclosed during the similarity join process. Firewalls have been commonly implemented over the internet for securing individual network. A firewall checks each and every incoming and outgoing packet to decide whether to accept or discard them based upon its policy. My proposed algorithm is “Redundancy Removal algorithm”, which is mainly used for reducing the redundant rule in the firewall with multi-rule coverage. This involves semi-honest computation between two firewalls by preserving privacy of the each party firewall policy. To avoid rule overhead and increase efficiency by firewall optimization. Figure2.Firewall proposed rule set review mechanism VI. CONCLUSION To identify an important problem of cross-domain privacy-preserving interfirewall redundancy detection. Implement the protocol in java and conducting extensive evolution. The result of the real firewall policies shows that, the protocol can remove as many of the redundant rules. This protocol is mainly applicable for identifying the interfirewall redundancy of firewall with a few thousands of rules. However it is still expensive to compare two firewall with many thousands of rules. Reducing complexity of the protocol is needs to be further studies. Demonstrate the rule optimization, from FW1 to FW2, and note that a similar rule optimization is possible in the opposite direction, i.e., FW2 to FW1.
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 265 In the first scenario, FW1 toFW2, it is FW1 that is improving the performance load of FW2, and in return FW2 is improving the performance of FW1 in a vice-versa manner. All this is being achieved without FW1 or FW2 reveling each other’s policies thus allowing for a proper administrative separation. This protocol is most beneficial if both parties are willing to benefit from it and can collaborate in a mutual manner. There are many special cases that could be explored based on the current protocol. For example, there may be host or Network Address Translator (NAT) device between two adjacent firewalls. The current protocol cannot be directly applied to such cases. Extending our protocol to these cases could be an interesting topic and requires further investigation. REFERENCES [1] nf-HiPAC, “Firewall throughput test,” 2012 [Online]. Available: http:// www.hipac.org/performance_tests/results.html [2] R. Agrawal, A. Evfimievski, and R. Srikant, “Information sharing across private databases,” inProc. ACM SIGMOD, 2003, pp. 86–97. [3] E.Al-Shaer and H. Hamed, “Discovery of policy anomalies in distributed firewalls,” in Proc. IEEE INFOCOM, 2004, pp. 2605–2616. [4] J.Brickell and V. Shmatikov, “Privacy-preserving graph algorithms in the semi-honest model,” in Proc. ASIACRYPT, 2010, pp. 236–252. [5] Y.-K. Chang, “Fast binary and multiway prefix searches for packet forwarding,” Comput. Netw., vol. 51, no. 3, pp. 588–605, 2007. [6] J. Cheng, H. Yang, S. H.Wong, and S. Lu, “Design and implementation of cross-domain cooperative firewall,” in Proc. IEEE ICNP, 2007, pp. 284–293. [7] Q. Dong, S. Banerjee, J. Wang, D. Agrawal, and A. Shukla, “Packet classifiers in ternary CAMs can be smaller,” in Proc. ACM SIGMETRICS, 2006, pp. 311–322. [8] O.Goldreich, “Secure multi-party computations,” Working draft, Ver. 1.4, 2002. [9] O.Goldreich, Foundations of Cryptography: Volume II (Basic Applications). Cambridge, U.K.: Cambridge Univ. Press, 2004. [10] M. G. Gouda and A. X. Liu, “Firewall design: Consistency, completeness and compactness,” in Proc. IEEE ICDCS, 2004, pp. 320–327. [11] M. G. Gouda and A. X. Liu, “Structured firewall design,” Comput. Netw., vol. 51, no. 4, pp. 1106–1120, 2007. [12] P. Gupta, “Algorithms for routing lookups and packet classification,” Ph.D. dissertation, Stanford Univ., Stanford, CA, 2000. [13] A. X. Liu and F. Chen, “Collaborative enforcement of firewall policies in virtual private networks,” in Proc. ACM PODC, 2008, pp. 95–104. [14] A. X. Liu and M. G. Gouda, “Diverse firewall design,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 8, pp. 1237 1251, Sep. 2008.