防火墙论文阅读笔记

1. Firewall Policy Diagram

《Firewall Policy Diagram: Novel Data Structures and Algorithms for Modeling, Analysis, and Comprehension of Network Firewalls》

防火墙使用情况
Packet filter parameters

2. Algorithms for Analysing Firewall and Router Access Lists

《Algorithms for Analysing Firewall and Router Access Lists》

Converting rule sets into boolean expressions
access-list 101 permit tcp 20.9.17.8 255.255.255.255 121.11.127.20 255.255.255.255 range 23 27
  1. Representing numbers as bit-vectors, examples:

image

image

3. A Firewall Application Using Binary Decision Diagram

《A Firewall Application Using Binary Decision Diagram》

Redundancy Removal Using BDD

4. Complete Redundancy Detection in Firewalls

《Complete Redundancy Detection in Firewalls》

5. THE GEOMETRIC EFFICIENT MATCHING ALGORITHM FOR FIREWALLS EXTENDED ABSTRACT

《THE GEOMETRIC EFFICIENT MATCHING ALGORITHM FOR FIREWALLS EXTENDED ABSTRACT》

Every rule consists of set of ranges [li , ri ] for i = 1, ... , d (d is the number of fields to match), where each range corresponds to the i-th field in a packet header. The field values are in 0 ≤ li, ri≤ Ui, where Ui = 2^32 − 1 for IP addresses, Ui = 65535 for portnumbers, and Ui = 255 for ICMP message type or code.

6. Efficient Techniques for Fast Packet Classification

《Efficient Techniques for Fast Packet Classification》

7. Network Firewall Policy Tries

《Network Firewall Policy Tries》

8. COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES

《COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES》

9. Study of Efficient Firewall Packet Filtering and Matching Algorithms

《Study of Efficient Firewall Packet Filtering and Matching Algorithms》

10. Rule Order Optimization For Packet Filtering Firewall

《Rule Order Optimization For Packet Filtering Firewall》

11. Detection and Resolution of Anomalies in Firewall Policy Rules

https://personal.utdallas.edu/~bxt043000/Publications/Conference-Papers/DAS/C70_Detection_and_Resolution_of_Anomalies_in_Firewall_Policy_Rules.pdf

主要贡献是策略关系的分类

12. Detecting and Resolving Firewall Policy Anomalies

https://people.cs.clemson.edu/~hongxih/papers/TDSC2012-3.pdf

13. Methods for Firewall Policy Detection and Prevention

http://ijsetr.org/wp-content/uploads/2014/07/IJSETR-VOL-3-ISSUE-7-1934-1939.pdf

参考资料​​​