To Provide An Innovative Policy Anomaly Management Framework For Firewalls
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
Firewalls have been widely organized on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to choose whether to accept or discard the packet based on its policy. Optimizing firewall policies is vital for improving network performance. In this paper we propose the first cross-domain privacy-preserving cooperative firewall policy optimization protocol. Specifically for any two adjacent firewalls belonging to two different administrative domains our protocol can recognize in each firewall the rules that can be removed because of the other firewall. The optimization process involves cooperative computation between the two firewalls without any party disclosing its policy to the other. Firewalls are significant in securing private networks of businesses, institutions and home networks. A firewall is frequently placed at the entry between a private network and the external network so that it can ensure each incoming or outgoing packet and choose whether to accept or abandon the packet based on its policy. A firewall policy is typically specified as a sequence of rules called Access Control List (ACL) and each rule has a predicate over multiple packet header fields i.e., source IP, destination IP, source port, destination port, and protocol type and a decision i.e., accept and discard for the packets that counterpart the predicate. In this paper we recommend the first cross-domain privacypreserving cooperative firewall policy optimization protocol.
Authors and Affiliations
Subha Sree Mallela| Department of Computer Science And Engineering Akula Sree Ramulu Institute of Engineering and Technology, Prathipadu, Tadepalligudem, A.P, India, subhasree.mallela@gmail.com, M M Bala Krishna| Department of Computer Science And Engineering Akula Sree Ramulu Institute of Engineering and Technology, Prathipadu, Tadepalligudem, A.P, India, balu_522@yahhoo.co.in, KTV Subba Rao| Department of Computer Science And Engineering Akula Sree Ramulu Institute of Engineering and Technology, Prathipadu, Tadepalligudem, A.P, India, ogidi@rediffmail.com
Protection of “Fault Tolerant Parallel Filters†by Hamming code with Reversible logic
Advanced channels are generally utilized as a part of flag preparing and correspondence frameworks. Now and again, the dependability of those frameworks is basic, and blame tolerant channel executions are required. T...
Accessible and Confident allotment of Personal Health Records in the cloud
PHRs grant patients access to a wide range of health information sources, best medical practices and health knowledge. In patient centric secure sharing, patients will create, manage and control their personal health...
A NOVEL HYBRID FEATURE EXTRACTION TECHNIQUE FOR FACE RECOGNITION
Face recognition is a computer for identifying and retrieving desired images from a large collection on the basis of features(color, texture, shape..).CBIR system is generally used in security, medicine, entertainment...
Huddling For Anonymization Of Compacted And Disseminated Public Systems
Social network: a social structure consists of nodes and ties. Noes are the individual actors within the networks May be different kinds May have attributes, labels or classes Ties are the relationships between the a...
Design and Develop a GUI Tool for Universal Embedded Automation System
We are developing a GUI tool for a universal Embedded Automation System. This universal Automation System has high speed Microcontroller which has analog, digital, serial communication and pulse width modulator. By u...