Skip to main content

Comparison Model and Algorithm for Distributed Firewall Policy

  • Conference paper
  • First Online:
Computational Intelligence (ICIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4114))

Included in the following conference series:

Abstract

As a traditional technique of information security, distributed firewall has taken very important position, while problems remain. Correct configuration of distributed firewall policies and keeping individual firewall filter decisions compatible to each other are quite inconvenient for administrators. To realize the comparison between firewalls’ policies, this paper provide FPT(firewall policy tree) model, and the construction algorithm which can turn a firewall policy into a policy tree, as well as the comparison algorithm. Combination of the two algorithms can be used to perform a comparison between distributed firewalls’ policies. By doing this, the paper can obtain the set of data packages on which different firewalls have made inconsistent filter decision, and find out the inconsistency in distributed firewall policies. Besides, this model could be extended to package classification systems for policies comparison.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, W., Chen, W., Li, Z., Chen, H. (2006). Comparison Model and Algorithm for Distributed Firewall Policy. In: Huang, DS., Li, K., Irwin, G.W. (eds) Computational Intelligence. ICIC 2006. Lecture Notes in Computer Science(), vol 4114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-37275-2_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-37275-2_67

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37274-5

  • Online ISBN: 978-3-540-37275-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics