Traffic-Aware Firewall Optimization Strategies

@article{Acharya2006TrafficAwareFO,
  title={Traffic-Aware Firewall Optimization Strategies},
  author={Subrata Acharya and Jia Wang and Zihui Ge and Taieb Znati and Albert G. Greenberg},
  journal={2006 IEEE International Conference on Communications},
  year={2006},
  volume={5},
  pages={2225-2230}
}
The overall performance of a firewall is crucial in enforcing and administrating security, especially when the network is under attack. The continuous growth of the Internet, coupled with the increasing sophistication of the attacks, is placing stringent demands on firewall performance. In this paper, we describe a traffic-aware optimization framework to improve the operational cost of firewalls. Based on this framework, we design a set of tools that inspect and analyze both multidimensional… CONTINUE READING
Highly Cited
This paper has 94 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 32 extracted citations

An axiomatic approach to firewall rule update

Richard Booth, Wijittra Noisanguan Mahasarakham
2009
View 7 Excerpts
Highly Influenced

Linear-tree rule structure for firewall optimization

Communications, Internet, and Information Technology • 2007
View 10 Excerpts
Highly Influenced

A Hierarchical Model for Firewall Policy Extraction

2009 International Conference on Advanced Information Networking and Applications • 2009
View 7 Excerpts
Method Support
Highly Influenced

Anomaly detection approach using hybrid algorithm of data mining technique

2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE) • 2017
View 1 Excerpt

95 Citations

051015'08'11'14'17
Citations per Year
Semantic Scholar estimates that this publication has 95 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-9 of 9 references

A Traffic- Aware Framework and Optimization Strategies for Large Scale Enterprise Networks

S. Acharya, J. Wang, Z. Ge, T. Znati, A. Greenberg
Technical Report, pp. 1–20, September 2005. • 2005
View 1 Excerpt

Modeling and Management of Firewall Policies

IEEE Transactions on Network and Service Management • 2004
View 1 Excerpt

On the Deterministic Enforcement of Unordered Security Policies

M. Condell, L. Sanchez
BBN Technical Memorandum No. 1346, April 26, 2004. • 2004
View 1 Excerpt

ACLA: A framework for Access Control List (ACL) Analysis and Optimization

Communications and Multimedia Security • 2001
View 1 Excerpt