Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Validating the Rule set with BDD & Usage with GEM for Improving Efficiency of Firewalls


Affiliations
1 JNTUK, St.Ann‘sCollege of Engineering & Technology Chirala, Andhra Pradesh, India
2 JNTUK, St.Ann‘s College of Engineering & Technology Chirala, Andhra Pradesh, India
     

   Subscribe/Renew Journal


World is running on internet in real sense since all the important and major tasks of life are carried out through internet. All the major and huge businesses depend on internet but at the same time internet is a big threat for these conglomerates. Because hackers and scams can ruin the online businesses and they could face great deal of data loss. In order to avoid such sort of internet corruption, firewalls are designed as to protect the networks from hackers and scams. Firewall is basically a blockade which restricts the outside forces from accessing your network and attacking your data. By filtering packets the firewalls can improve security and performance. However, as the size of the rule list increases, it becomes difficult to maintain and validate the rules. Ordered binary decision diagrams (BDDs) – a compact method of representing and manipulating Boolean expressions – are a potential method of representing the rules. Geometric Efficient Matching Algorithm (GEM) uses near-linear space, and only needs approximately 13 MB of space for rule-bases of 5,000 rules. Moreover, with use of additional space improving heuristics, the space requirement can be reduced to 2-3 MB for 5,000 rules. This paper presents a new approach not only to analyze and to validate rule sets and also resultant rule sets are passed as an input for Geometric Efficient Matching Algorithm for improving the efficiency of firewalls.

Keywords

Firewall, BDDs, Internet Corruption, GEM.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 197

PDF Views: 3




  • Validating the Rule set with BDD & Usage with GEM for Improving Efficiency of Firewalls

Abstract Views: 197  |  PDF Views: 3

Authors

M. Kasi Viswanadh
JNTUK, St.Ann‘sCollege of Engineering & Technology Chirala, Andhra Pradesh, India
P. Harini
JNTUK, St.Ann‘s College of Engineering & Technology Chirala, Andhra Pradesh, India

Abstract


World is running on internet in real sense since all the important and major tasks of life are carried out through internet. All the major and huge businesses depend on internet but at the same time internet is a big threat for these conglomerates. Because hackers and scams can ruin the online businesses and they could face great deal of data loss. In order to avoid such sort of internet corruption, firewalls are designed as to protect the networks from hackers and scams. Firewall is basically a blockade which restricts the outside forces from accessing your network and attacking your data. By filtering packets the firewalls can improve security and performance. However, as the size of the rule list increases, it becomes difficult to maintain and validate the rules. Ordered binary decision diagrams (BDDs) – a compact method of representing and manipulating Boolean expressions – are a potential method of representing the rules. Geometric Efficient Matching Algorithm (GEM) uses near-linear space, and only needs approximately 13 MB of space for rule-bases of 5,000 rules. Moreover, with use of additional space improving heuristics, the space requirement can be reduced to 2-3 MB for 5,000 rules. This paper presents a new approach not only to analyze and to validate rule sets and also resultant rule sets are passed as an input for Geometric Efficient Matching Algorithm for improving the efficiency of firewalls.

Keywords


Firewall, BDDs, Internet Corruption, GEM.