The Geometric Efficient Matching Algorithm for Firewalls
#1

The Geometric Efficient Matching Algorithm for Firewalls



.docx   The Geometric Efficient Matching Algorithm for firewall.docx (Size: 93.85 KB / Downloads: 2)

Existing System:
Existing algorithms implement the “longest prefix match” semantics, using several different approaches. The IPL algorithm, which is based on results, divides the search space into elementary intervals by different prefixes for each dimension, and finds the best (longest) match for each such interval. Firewall statefulness is commonly implemented by two separate search mechanisms: (i) a slow algorithm that implements the “first match” semantics and compares a packet to all the rules, and (ii) a fast state lookup mechanism that checks whether a packet belongs to an existing open flow. In many firewalls, the slow algorithm is a naive linear search of the rule-base, while the state lookup mechanism uses a hash-table or a search-tree

Disadvantages:

1. There is no secure when the packet sending.
2. Firewall not used before
3. Time consuming is high
Proposed System:

In the field of computational geometry, proposed an algorithm which solves the point location problem for n non-overlapping d-dimensional hyper-rectangles, with a linear space requirement and O ((log n) (d−1)) search time. In our case, we have overlapping d-dimensional hyper-rectangles, since firewall rules can, and often do, overlap each other— making rules overlap is the method firewall administrators use to implement intersection and difference operations on sets of IP addresses or port numbers. These overlapping hyper-rectangles can be decomposed into non-overlapping hyper-rectangles—however, a moment’s reflection shows that the number of resulting non-overlapping hyper-rectangles is (nd), thus the worst case complexity for firewall rules is no better than that of GEM.

Advantages:

1. Packet filter firewall supports high speed:

Packet filter firewall over configurations of simple network works with more speed. The thing behind this is that packet filter firewall has the directly connection within external hosts & internal users. Packet filters take decisions on the basis of the each packets, it doesn't take decision on the basis of the traffic context. An increases the vulnerability over internet.
It used to implement and enforce a security policy for communication between networks

Algorithm:

Geometric Efficient Matching Algorithm
The firewall packet matching problem finds the first rule that matches a given packet on one or more fields from its header. Every rule consists of set of ranges [li, ri] for i = 1, . . . , d, where each range corresponds to the i-th field in a packet header. The field values are in 0 ≤ li, ri ≤ Ui, where Ui = 232 − 1 for IP addresses, Ui = 65535 for port numbers, and Ui = 255 for ICMP message type or code. Table 1 lists the header fields we use (the port fields can double as the message type and code for ICMP packets). For notation convenience later on, we assign each of these fields a number.
Modules:

1. Firewall Splitting and Matching:

In order to test the build time, data structure size and search speed behavior, we generated rule-bases of sizes from 1000 to 20000 and built the GEM data structure using two approaches: 2-part heuristic splitting and 3-part heuristic splitting, as described .it shows the data structure size of the unsplit, 2- part splitting, and 3-part splitting approaches it shows that both splitting heuristics are very effective in reducing the data structure size. In earlier simulations we verified that the firewall’s matching speed is largely unaffected by the distribution of port numbers (both linear search and GEM). There is an extensive literature dealing with router packet matching, usually called “packet classification”, Thus we believe that GEM may be a good candidate for use in firewall matching engines.

2. Encryption module:

Allows trusted users to access sensitive information while traversing untrusted networks, it is highly useful for users. The services and users are limited in their tunnel traffic.

3. Protection and Detection mode:
Easy testing of new rules in a live environment without disrupting the current security policy is supported. Rule sets are applied by deploying them in Protection mode to enforce secure behavior, permit or deny traffic and seal web application parameters against modification. Rule sets are tested by deploying them in Detection mode to evaluate them against traffic and log actions without enforcing them.

4. Random Rule Simulation module:


On one hand, these early simulations showed us that the
search itself was indeed very fast: a single packet match took around 1μsec, since it only required 4 executions of a binary search in memory.
On the other hand, we learned that the data structure size
grew rapidly—and that the order of fields had little or no effect on this size. The problem was that since the ranges in the rules were chosen uniformly, almost every pair of ranges (in every dimension) had a non-empty intersection. All these intersections produced a very fragmented space subdivision, and effectively exhibited the worst-case behavior in the data structure size. We concluded that a more realistic rule model is needed.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: geometric efficient matching firewall, latest 2013 updated ppt on efficient pattern matching algorithm for memory architecture, the geometric efficient matching algorithm for firewall project download, geometric efficient matching algorithm definition, the geometric efficient matching algorithm for firewalls project, dataflowdiagram for the geomentric efficient matching algorithm for firewalls, working of geometric algorithm in hawk eye,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networksy seminar addict 1 1,526 25-08-2014, 05:40 PM
Last Post: Guest
  RSA ALGORITHM IMPLEMENTATION project uploader 2 2,416 26-06-2013, 06:39 PM
Last Post: arora_rachna04
  An Efficient Online Shopping System seminar addict 2 3,750 24-01-2013, 02:31 PM
Last Post: seminar details
  Resizing image using bilinear interpolation algorithm in MATLAB seminar addict 1 2,684 13-01-2013, 10:15 PM
Last Post: Guest
  Bresenham Line Drawing Algorithm Circle Drawing & Polygon Filling project report helper 1 4,643 16-12-2012, 07:35 AM
Last Post: Guest
  Offline Handwriting Recognition Using Genetic Algorithm project uploader 1 2,642 09-11-2012, 12:27 PM
Last Post: seminar details
  Stego Machine – Video Steganography using Modified LSB Algorithm seminar details 1 2,469 25-10-2012, 01:40 PM
Last Post: seminar details
  ECONOMIC LOAD DISPATCH WITH VALVE-POINT EFFECT USING ARTIFICIAL BEE COLONY ALGORITHM seminar addict 1 1,888 24-10-2012, 04:02 PM
Last Post: seminar details
  AN EFFICIENT APPROACH FOR CAPACITOR SIZING AND LOCATION ON A RADIAL seminar details 0 1,055 09-06-2012, 02:17 PM
Last Post: seminar details
  An efficient algorithm for iris pattern recognition using 2D Gabor wavelet details seminar details 0 961 08-06-2012, 01:16 PM
Last Post: seminar details

Forum Jump: