CFP last date
20 May 2024
Reseach Article

Resolving Cross Domain Firewall Policy Anomalies

by Abdul Raziya Sultana, Amrutasagar Kavarthapu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 14
Year of Publication: 2015
Authors: Abdul Raziya Sultana, Amrutasagar Kavarthapu
10.5120/ijca2015905771

Abdul Raziya Sultana, Amrutasagar Kavarthapu . Resolving Cross Domain Firewall Policy Anomalies. International Journal of Computer Applications. 124, 14 ( August 2015), 12-15. DOI=10.5120/ijca2015905771

@article{ 10.5120/ijca2015905771,
author = { Abdul Raziya Sultana, Amrutasagar Kavarthapu },
title = { Resolving Cross Domain Firewall Policy Anomalies },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 14 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number14/22172-2015905771/ },
doi = { 10.5120/ijca2015905771 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:48.978748+05:30
%A Abdul Raziya Sultana
%A Amrutasagar Kavarthapu
%T Resolving Cross Domain Firewall Policy Anomalies
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 14
%P 12-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For last few years, Firewall usage with regard to protected network emails is important. Its ability to process inbound and confident bundle moves and accept or eliminate those bundle in accordance with the processing is what keeps this systems and networks protected. But considering a vast organization’s protection needs with regard to firewall program guidelines, typical home solutions won't be sufficient because such organizations are compounds of different subnets which require comfort during plan quality. The key technical restriction is that firewall program guidelines cannot be shared across different websites for easier control because a firewall program plan might include important info and this might be a potential protection cycle hole that can be utilized by harmful users. Although largest rule calculations methods help to some extent they are unsuccessful of performance in accordance with the presence of NAT (Network Address Translation) device across different subnets (domains). So here recommend improving the current solution with a quality decision tree classifier criteria applied at routers for achieving the comfort maintained firewall program plan abnormality solutions with regard to repetitive rules control. So it involves wireless router extension recommend to imitate this event and confirm conclusion in accordance with the results.

References
  1. “Cross-Domain Privacy-Preserving Cooperative Firewall Optimization”, by Fei Chen, in IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 3, JUNE 2013.
  2. nf-HiPAC, “Firewall throughput test,” 2012 [Online]. Available: http://www.hipac.org/performance_tests/ results.html
  3. J. Brickell and V. Shmatikov, “Privacy-preserving graph algorithms in the semi-honest model,” in Proc. ASIACRYPT, 2010, pp. 236–252.
  4. A. X. Liu and M. G. Gouda, “Complete redundancy removal for packet classifiers in TCAMs,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 4, pp. 424–437, Apr. 2010
  5. A. X. Liu, C. R. Meiners, and E. Torng, “TCAM Razor: A systematic approach towards minimizing packet classifiers in TCAMs,” IEEE/ACM Trans. Netw., vol. 18, no. 2, pp. 490–500, Apr. 2010.
  6. A. X. Liu, C. R. Meiners, and Y. Zhou, “All-match based complete redundancy removal for packet classifiers in TCAMs,” in Proc. IEEE INFOCOM, 2008, pp. 574–582.
  7. “Decision Tree Learning on Very Large Data Sets”, by Lawrence O. Hall, Nitesh Chawla and Kevin W. Bowyer, in Proceedings of the 14th International Conference on Machine Learning, pp. 254-262, 1997.
  8. Y. Sang and H. Shen. Efficient and secure protocols for privacy-preserving set operations. ACM TISSEC, 13(9), 2009.
  9. S. Singh, F. Baboescu, G. Varghese, and J. Wang. Packet classification using multidimensional cutting. In SIGCOMM, 2003.
  10. Y.-W. E. Sung, C. Lund, M. Lyn, S. Rao, and S. Sen. Modeling and understanding end-to-end class of service policies in operational networks. In SIGCOMM, 2009.
  11. A. Wool. A quantitative study of firewall configuration errors. IEEE Computer, 37(6), 2004.
  12. A. X. Liu and M. G. Gouda, “Complete redundancy removal for packet classifiers in TCAMs,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 4, pp. 424–437, Apr. 2010.
  13. Q. Dong, S. Banerjee, J. Wang, D. Agrawal, and A. Shukla, “Packet classifiers in ternary CAMs can be smaller,” in Proc. ACM SIGMETRICS.
  14. E. Al-Shaer and H. Hamed, “Discovery of policy anomalies in distributed firewalls,” in Proc. IEEE INFOCOM, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Firewall Optimization. Privacy Cross Domain Access control rule policies.