A Space-Efficient Approach to Consistency Check of Firewall Rules

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Firewalls have been widely used in organizations to implement access control policies. However complicated management of firewall rule set has caused overheads and reduced the responsiveness of organizations. In this paper, we propose a solution for firewall rule management with a special aim at consistency check of firewall rules. We use Bloom filters, a space-efficient solution for membership checking with bounded false positive rate. To reduce inconsistencies, a membership check is performed each time before a firewall rule is inserted into the rule set. A revised Bloom filter is proposed to support set operations due to the wide use of range of IP addresses and port numbers in firewall rules. This efficient approach provides quick inconsistency/overlap check of firewall rules, and can alleviate management overheads for organizations that adopt firewalls.

    Original languageAmerican English
    Title of host publication22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009
    Pages19-24
    Number of pages6
    StatePublished - 2009
    Event22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009 - San Francisco, CA, United States
    Duration: Nov 4 2009Nov 6 2009

    Publication series

    Name22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009

    Conference

    Conference22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009
    Country/TerritoryUnited States
    CitySan Francisco, CA
    Period11/4/0911/6/09

    ASJC Scopus Subject Areas

    • Computer Science Applications
    • Industrial and Manufacturing Engineering

    Keywords

    • Bloom filter
    • Computer security
    • Firewall
    • Rule set

    Fingerprint

    Dive into the research topics of 'A Space-Efficient Approach to Consistency Check of Firewall Rules'. Together they form a unique fingerprint.

    Cite this