ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 2990-2992

Keywords : Firewall optimization; privacy preserving; Commutative Encryption;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

For securing private network the firewall have been widely used. Based on the policy a firewall checks each incoming and outgoing packet whether to accept or reject the packet. Optimization of firewall policies is important to improve the performance of the network. There are two types of firewall intra firewall and inter firewall. The prior work on optimization of firewall is based on either intra firewall or inter firewall optimization where the privacy of firewall policies is not a concern within one administrative domain. This paper explores inter firewall optimization between two administrative domains. The firewall policies cannot be shared across domains because a firewall policy contains confidential data and potential security holes, which can be attacked by attackers which is a key technical challenge. In this paper, we introduce the commutative encryption for privacy preserving in firewall optimization. The main objective of the application is to remove the redundant rules from two firewall from two different administrative domains without disclosing the actual value of rules to each other. This method preserves the privacy of each firewall.

Last modified: 2021-06-30 21:12:54