Figure 2 - uploaded by Vanaja Ramaswamy
Content may be subject to copyright.
Number of comparisons per packet for an unmatched packet percentage of 16

Number of comparisons per packet for an unmatched packet percentage of 16

Source publication
Article
Full-text available
A firewall as a network security perimeter device examines the incoming packets and compares them against a set of predefined rules. These rules that form the basis of the firewall"s policy is maintained in a list of permissions called the Access Control List (ACL). These access control lists are usually stored in some data structure and dictate wh...

Similar publications

Article
Full-text available
With the fast growth of net in recent years, laptop systems face enlarged variety of security threats. Despite various technological innovations for info assurance, it's still terribly troublesome to shield laptop systems. Therefore, unwanted intrusions happen once the particular software package systems square measure running. Completely different...
Article
Full-text available
In a wired network, security protocols such as encryption, authentication, and other methods are recognized as standards by the industry. Even so, there seems to be no data given mostly on financial impact of integrating such procedures in a wireless connection. Moreover, there is just no assessment of how effectively a wireless communication inter...
Article
Full-text available
The global access to valuable information from various fields through computer networks facilitates the intruder to harm computer and network resources. There are numerous technologies available to ensure network security, such as firewall, cryptographic techniques, authentication techniques and Intrusion Detection System (IDS). This paper presents...
Article
Full-text available
With the advent of technological society, data and intelligence have become the directional trend of development, and the network security of smart campus has become the focus of public attention day by day. The personalization of college students and the development of intelligent analytics have brought about a whole new change in privacy protecti...
Article
Full-text available
Cybersecurity is a growing concern in today’s interconnected world. Traditional cybersecurity approaches, such as signature-based detection and rule-based firewalls, are often limited in their ability to effectively respond to evolving and sophisticated cyber threats. Reinforcement learning (RL) has shown great potential in solving complex decision...

Citations

... During the implementation, the access list was implemented using a singly linked list data structure for the purpose of ease of implementation even though theoretically, a splay tree or a height balanced tree data structure would give better results [19]. Every node in the linked list corresponds to one rule in the access list. ...
Article
Full-text available
Firewalls play an extremely important role in today's networks. They are present universally in almost every corporate network across the globe and serve to protect such networks from unauthorized access. The firewall is most commonly implemented as a packet filter. The packet filter works by comparing incoming packets against a set of predefined rules called an access control list (ACL). It is vital to improve the performance of packet filtering firewalls as much as possible. Most of the research work in this area barring a few has not focused on utilizing traffic characteristics to improve the performance of packet filters. In this paper, we propose a simple algorithm that exploits traffic behavior by utilizing incoming traffic statistics to dynamically modify rule ordering in access control lists. Hence repeated packets or multiple packets from the same source require lesser number of comparisons before a rule is matched. When testing was performed for the proposed work using both a simulated firewall and simulated traffic the performance of the firewall showed considerable improvement.