Skip to main content

Firewall Queries

  • Conference paper
  • First Online:
Principles of Distributed Systems (OPODIS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3544))

Included in the following conference series:

Abstract

Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is to examine each incoming and outgoing packet and decide whether to accept or to discard the packet based on a sequence of rules. Because a firewall may have a large number of rules and the rules often conflict, understanding and analyzing the function of a firewall have been known to be notoriously difficult. An effective way to assist humans in understanding and analyzing the function of a firewall is by issuing firewall queries. An example of a firewall query is “Which computers in the private network can receive packets from a known malicious host in the outside Internet?”. Two problems need to be solved in order to make firewall queries practically useful: how to describe a firewall query and how to process a firewall query. In this paper, we first introduce a simple and effective SQL-like query language, called the Structured Firewall Query Language (SFQL), for describing firewall queries. Second, we present a theorem, called the Firewall Query Theorem, as a foundation for developing firewall query processing algorithms. Third, we present an efficient firewall query processing algorithm, which uses firewall decision trees as its core data structure. Experimental results show that our firewall query processing algorithm is very efficient: it takes less than 10 milliseconds to process a query over a firewall that has up to 10,000 rules.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Shaer, E., Hamed, H.: Discovery of policy anomalies in distributed firewalls. In: IEEE INFOCOM (March 2004)

    Google Scholar 

  2. Baboescu, F., Singh, S., Varghese, G.: Packet classification for core routers: Is there an alternative to cams? In: Proc. of IEEE INFOCOM (2003)

    Google Scholar 

  3. Baboescu, F., Varghese, G.: Fast and scalable conflict detection for packet classifiers. In: Proc. of the 10th IEEE International Conference on Network Protocols (2002)

    Google Scholar 

  4. Bartal, Y., Mayer, A.J., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. Technical Report EES2003-1, Dept. of Electrical Engineering Systems, Tel Aviv University (2003)

    Google Scholar 

  5. CERT. Test the firewall system, http://www.cert.org/security-improvement/practices/p060.html

  6. CERT Coordination Center, http://www.cert.org/advisories/ca-2003-20.html

  7. Moore, D., et al.: http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html

  8. Eppstein, D., Muthukrishnan, S.: Internet packet filter management and rectangle geometry. In: Symp. on Discrete Algorithms, pp. 827–835 (2001)

    Google Scholar 

  9. Eronen, P., Zitting, J.: An expert system for analyzing firewall rules. In: Proc. of the 6th Nordic Workshop on Secure IT Systems (NordSec 2001), pp. 100–107 (2001)

    Google Scholar 

  10. Farmer, D., Venema, W.: Improving the security of your site by breaking into it (1993), http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html

  11. Frantzen, M., Kerschbaum, F., Schultz, E., Fahmy, S.: A framework for understanding vulnerabilities in firewalls using a dataflow model of firewall internals. Computers and Security 20(3), 263–270 (2001)

    Article  Google Scholar 

  12. Freiss, M.: Protecting Networks with SATAN. O’Reilly & Associates, Inc., Sebastopol (1998)

    Google Scholar 

  13. Gouda, M.G., Liu, A.X.: Firewall design: consistency, completeness and compactness. In: Proc. of the 24th IEEE International Conference on Distributed Computing Systems (ICDCS 2004), pp. 320–327 (2004)

    Google Scholar 

  14. Gupta, P.: Algorithms for Routing Lookups and Packet Classification. PhD thesis, Stanford University (2000)

    Google Scholar 

  15. Gupta, P., McKeown, N.: Algorithms for packet classification. IEEE Network 15(2), 24–32 (2001)

    Article  Google Scholar 

  16. Guttman, J.D.: Filtering postures: Local enforcement for global policies. In: Proc. of IEEE Symp. on Security and Privacy, pp. 120–129 (1997)

    Google Scholar 

  17. Hari, A., Suri, S., Parulkar, G.M.: Detecting and resolving packet filter conflicts. In: Proc. of IEEE INFOCOM, pp. 1203–1212 (2000)

    Google Scholar 

  18. Hazelhurst, S., Attar, A., Sinnappan, R.: Algorithms for improving the dependability of firewall and filter rule lists. In: Proc. of the International Conference on Dependable Systems and Networks (DSN 2000), pp. 576–585 (2000)

    Google Scholar 

  19. Kamara, S., Fahmy, S., Schultz, E., Kerschbaum, F., Frantzen, M.: Analysis of vulnerabilities in internet firewalls. Computers and Security 22(3), 214–232 (2003)

    Article  Google Scholar 

  20. Liu, A.X., Gouda, M.G.: Diverse firewall design. In: Proc. of the International Conference on Dependable Systems and Networks (DSN 2004), pp. 595–604 (June 2004)

    Google Scholar 

  21. Mayer, A., Wool, A., Ziskind, E.: Fang: A firewall analysis engine. In: Proc. of IEEE Symp. on Security and Privacy, pp. 177–187 (2000)

    Google Scholar 

  22. Moffett, J.D., Sloman, M.S.: Policy conflict analysis in distributed system management. Journal of Organizational Computing 4(1), 1–22 (1994)

    Article  Google Scholar 

  23. Nessus (March 2004), http://www.nessus.org/

  24. Rubin, A.D., Geer, D., Ranum, M.J.: Web Security Sourcebook, 1st edn. Wiley Computer Publishing, Chichester (1997)

    Google Scholar 

  25. Wool, A.: Architecting the lumeta firewall analyzer. In: Proc. of the 10th USENIX Security Symposium, pp. 85–97 (August 2001)

    Google Scholar 

  26. Wool, A.: A quantitative study of firewall configuration errors. IEEE Computer 37(6), 62–67 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, A.X., Gouda, M.G., Ma, H.H., Ngu, A.H. (2005). Firewall Queries. In: Higashino, T. (eds) Principles of Distributed Systems. OPODIS 2004. Lecture Notes in Computer Science, vol 3544. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11516798_15

Download citation

  • DOI: https://doi.org/10.1007/11516798_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27324-0

  • Online ISBN: 978-3-540-31584-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics