Validating the Rule set with BDD & Usage with GEM for Improving Efficiency of Firewalls
Abstract
Keywords
Full Text:
PDFReferences
Dmitry Rovniagin and Avishai Wool, ―The Geometric Efficient Matching Algorithm for Firewalls,‖ IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 1
Scott Hazelhurst, ―Algorithms for Analysing Firewall and Router Access Lists‖ Programme for Highly Dependable Systems, Department of Computer Science, 16 July 1999
M. de Berg, M. van Kreveld, and M. Overmars, Computational Geometry: Algorithms and Applications, second ed. Springer-Verlag,2000.
Cisco Systems Inc. Configuring IP Systems. Published at the Cisco web site, 1997. http://www.cisco.com /univercd /cc /td /doc /product /software.
S Hazelhurst, A Fatti, and A Henwood. ‗Binary Decision Diagram Representations of Firewall and Router Access Lists‘. Technical Report TR-Wits-CS-1998-3, Department of Computer Science, University of the Witwatersrand, (October 1998). Proceedings of SAICSIT ‘98
A. Wool, ―Packet Filtering and Stateful Firewalls,‖ Handbook of Information Security, vol. III: Threats, Vulnerabilities, Prevention, Detection and Management, H. Bidgoli, ed., chapter 171, pp. 526-536. John Wiley & Sons, 2006
D.P. Dobkin and R.J. Lipton, ―Multidimensional Searching
Problems,‖ SIAM J. Computing, vol. 5, no. 2, pp. 181-186, 1976.
J. Matou_sek, ―Geometric Range Searching,‖ ACM Computing Surveys, vol. 26, no. 4, pp. 422-461, 1994.
D. Eppstein and S. Muthukrishnan, ―Internet Packet Filter Management and Rectangle Geometry,‖ Proc. ACM-SIAM Symp. Discrete Algorithms (SODA), pp. 827-835, 2001.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.