However, the firewall administrator is who
ultimately decides if an inconsistent rule is faulty.
In this paper, we have proposed a new
inconsistency isolation algorithm for firewalls with
five integer (or intervals of integer). Our approach
has been based on an analysis of which data type
each rule selector can to store, on the design of
specialized abstract data types for each one, and on
divide and conquer algorithm. A theoretical
algorithmic complexity as well as an experimental
performance analysis has been made in order to
validate our theoretical results.
Our proposal represents an algorithm that is 10 to
100 times faster then the current best known one.
Furthermore, results are returned over the original,
unmodified ACL in our case, rather than over a
decomposed ACL which is different than the
original one.
However, our approach has some limitations that
give us opportunities for improvement in future
works. A performance analysis of each part ADT of
the algorithm is necessary in order to know where
the bottleneck is now, in order improve even more
the algorithms. Checking the behaviour of the
proposed ADTs in dynamic environments could be
another interesting point, where another comparison
in complexity and memory requirements to
Baboescu algorithm would be a point.
ACKNOWLEDGEMENTS
This work has been partially funded by Spanish
Ministry of Science and Education project under
grant DPI2006-15476-C02-01, and by FEDER
(under ERDF Program).
REFERENCES
Al-Shaer, E., Hamed, H. Modeling and Management of
Firewall Policies. IEEE eTransactions on Network and
Service Management (eTNSM) Vol.1, No.1, 2004.
Baboescu, F., Varguese, G. Fast and Scalable Conflict
Detection for Packet Classifiers. Computers & Networks
Vol.42, No.6, Elsevier 2003.
Bollig, B., Wegener, I. Improving the Variable Ordering of
OBDDs is NP-Complete. IEEE Transactions on
Computers, Vol.45 No.9, September 1996.
Cormen, T., Leiserson, C., Rivest, R., Stein, C. Introduction
to Algorithms, 2nd Ed. McGraw-Hill, 2001.
Chiang, Y., Tamassia, R. Dynamic Algorithms in
Computational Geometry. Technical Report CS-91-24.
Brown University, Providence, RI, USA, 1991.
de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf,
O. Computational Geometry: Algorithms and
Applications. Springer-Verlag, Berling, 1997.
Edelsbrunner, H. A new approach to rectangle intersections,
Part II. International Journal on Computational
Mathematics. Vol.13, pp. 221-229, 1983.
Edelsbrunner2, H. A new approach to rectangle intersections,
Part I. International Journal on Computational
Mathematics. Vol.13, pp. 209-219, 1983.
Eppstein, D., Muthukrishnan, S. Internet Packet Filter
Management and Rectangle Geometry. Proceedings of
the Annual ACM-SIAM Symposium on Discrete
Algorithms (SODA), January 2001.
García-Alfaro, J., Boulahia-Cuppens, N., Cuppens, F.
Complete Analysis of Configuration Rules to Guarantee
Reliable Network Security Policies, Springer-Verlag
International Journal of Information Security. Vol.7,
No.2, 2008.
Gupta, P., McKcown, N. Packet classification on multiple
fields. Proceedings of the ACM SIGCOMM. Cambridge,
MA, USA. September 1999.
Hamed, H., Al-Shaer, E. Taxonomy of Conflicts in Network
Security Policies. IEEE Communications Magazine
Vol.44, No.3, 2006.
Hari, B., Suri, S., Parulkar, G. Detecting and Resolving
Packet Filter Conflicts. Proceedings of IEEE INFOCOM,
March 2000.
Liu, Alex X., Gouda, Mohamed G., "Complete Redundancy
Removal for Packet Classifiers in TCAMs," IEEE
Transactions on Parallel and Distributed Systems, 24
Sept. 2008. IEEE computer Society Digital Library. IEEE
Computer Society.
Luis, S., Condell, M. Security policy protocol. IETF Internet
Draft IPSPSPP-01, 2002.
Pozo1, S., Ceballos, R., Gasca, R.M. Model Based
Development of Firewall Rule Sets: Diagnosing Model
Faults. Information and Software Technology Journal,
No. 51, Issue 5, pp. 894-915. Elsevier, 2009.
Pozo2, S., Ceballos, R., Gasca, R.M.. A Heuristic Polynomial
Algorithm for Local Inconsistecy Diagnosis in Firewall
Rule Sets. 3rd International Conference on Security and
Cryptography (SECRYPT), in International Conference
on e-Business and Telecommunications (ICETE). Porto,
Portugal. INSTICC Press, 2008.
Srinivasan, V., Varguese, G, Suri, S., Waldvogel, M. Fast and
Scalable Layer Four Switching. Proceedings of the ACM
SIGCOMM conference on Applications, Technologies,
Architectures and Protocols for Computer
Communication, Vancouver, British Columbia, Canada,
ACM Press, 1998.
Taylor, David E. Survey and taxonomy of packet
classification techniques. ACM Computing Surveys,
Vol.37, No.3, 2005.
Wool, A. A quantitative study of firewall configuration errors.
IEEE Computer, Vol.37, No.6, 2004.
Yuan, L., Mai, J., Su, Z., Chen, H., Chuah,, C. Mohapatra, P.
FIREMAN: A Toolkit for FIREwall Modelling and
ANalysis. IEEE Symposium on Security and Privacy
(S&P’06). Oakland, CA, USA. May 2006.
EFFICIENT ALGORITHMS AND ABSTRACT DATA TYPES FOR LOCAL INCONSISTENCY ISOLATION IN
FIREWALL ACLS
53