CFP last date
20 January 2025
Reseach Article

Adaptive Reorientation Method for Performance Enhancement in Network Firewalls

by M. B Subrahmanyam, P Ravi Kiran Varma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 14
Year of Publication: 2013
Authors: M. B Subrahmanyam, P Ravi Kiran Varma
10.5120/13932-1947

M. B Subrahmanyam, P Ravi Kiran Varma . Adaptive Reorientation Method for Performance Enhancement in Network Firewalls. International Journal of Computer Applications. 80, 14 ( October 2013), 31-36. DOI=10.5120/13932-1947

@article{ 10.5120/13932-1947,
author = { M. B Subrahmanyam, P Ravi Kiran Varma },
title = { Adaptive Reorientation Method for Performance Enhancement in Network Firewalls },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 14 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number14/13932-1947/ },
doi = { 10.5120/13932-1947 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:34.728416+05:30
%A M. B Subrahmanyam
%A P Ravi Kiran Varma
%T Adaptive Reorientation Method for Performance Enhancement in Network Firewalls
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 14
%P 31-36
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Firewall plays a crucial role in network defense and perimeter security. The performance of such a firewall greatly depends on number of rules processed per packet and the order of the rules as well. In this paper an Adaptive Reorientation Method (ARM) was proposed, which will calculate the weight of each rule, after few cycles of traffic simulations. The rules are then reoriented according to their weights. The firewall is configured using several Access Control Lists (ACL) and using the ARM priority of the rules are calculated and are reoriented accordingly. The performance of the firewall is evaluated and compared before and after orientation.

References
  1. David W. Chapman Jr. , Andy Fox, December 18, 2001. Cisco Secure PIX Firewalls, Cisco Press.
  2. Gregor N. Purdy. , June 30, 2009. Linux iptables Pocket Reference (Pocket Reference (O'Reilly)) [Kindle Edition]
  3. Babak Farrokhi . , April 2008. Network Administration with FreeBSD 7, packt publishing.
  4. Americo J. Melara, June 2002. Performance analysis of the Linux firewall in a host," Master's thesis. California Polyphonic State University.
  5. Noe Nevarez and Huy Duc Vo. 2007. Linux Firewall Performance Analysis"University of Houstn
  6. Qing-Xiu Wu. 2012. The Research and Application of Firewall based on Netfilter. Science Direct, Physics Procedia 25.
  7. H. Hemed, A. El-Atawy, and E. Al-Shaer. Adaptive statistical optimization techniques for firewall packet filtering. School of Computer Science, DePaul University, Chicago, USA.
  8. K. Salah. proceedings 2010. Queuing Analysis of Network Firewalls. IEEE Globecom.
  9. Huirong Fu, Ming Zhang. proceedins 2006. Online adaptive firewall allocation in internet data canter. Science direct, computer communications.
  10. R. Hunt, T. verwoerd. 2003 Reactive Firewalls –a technique. Science Direct, Computer Communication 26.
  11. Noel De Palma, Daniel Hagimont, Fabienne Boyer, and Laurent Broto. proceedings 2012. Self-Protection in a Clustered Distributed System. IEEE Parallel and Distributed Systems. Page 330-336
  12. Liang Zhi-honga, Luo Jian-zhenb, Liang Zhi-qianga a*. 2011. System Recovery Testing of Hardware Firewall" Science Direct, Procedia Engineering 25.
  13. Sean Michael Kerner,. April 26, 2013. DDOS attack Report.
  14. Khaled Salah, Khalid Elbadawi, and Raouf Boutaba. 2012. Performance Modeling and Analysis of Network Firewalls. IEEE Transaction on Network and Service Management.
  15. Chris Roeckl. 2004. Stateful Inspection Firewalls. Juniper Networks, Inc.
Index Terms

Computer Science
Information Sciences

Keywords

Network firewall Performance enhancement Adaptive Reorientation.