A Conflict Detection Method for IPv6 Time-Based Firewall Policy

被引:2
|
作者
Zhang, Xue [1 ]
Yin, Yi [1 ]
Liu, Wei [1 ]
Peng, Zhizhen [1 ]
Zhang, Guoqiang [1 ]
Wang, Yun [2 ]
Tateiwa, Yuichiro [3 ]
Takahashi, Naohisa [3 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Peoples R China
[2] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Peoples R China
[3] Nagoya Inst Technol, Dept Comp Sci & Engn, Nagoya, Aichi, Japan
基金
中国国家自然科学基金;
关键词
firewall policy; time-based; IPv6; SMT Solver;
D O I
10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Firewalls have been a very important secure tool to protect networks against attacks, which usually filter the unauthorized traffic entering the secured network. The packet filleting based on a predefined collection of ordered rules. Along with the IPv6 protocol is widely used, and the security issues comes with it. Firewall for IPv6 network, as an important element to protect network security, it will be not able to filter packets correctly if there are conflicts that caused by the same packet matching two or more rules. In addition, a new kind of firewall with time constraint is used more and more widely by different firewall company, such as, ACLs of Cisco, Iptalbes of Linux, and the like. It is a hard work to manage the rules in IPv4 firewall policy, not to mention the rules in IPv6 time-based firewall policy. Many methods have been proposed to analyze and detect the conflicts of individual or distributed firewall policies. However, very few of them can deal with the time constraint of rules. Therefore, it is an urgent problem to detect the conflicts of the IPv6 time-based firewall policy. In order to solve this problem, we describe a method, which can analyze the IPv6 time-based firewall policy. We use a formal method to analyze the me: ' g of IPv6 time-based firewall policy. Next, we take the formal validation tool (SNIT solver 13) to detect all the possible conflicts between every two rules. Lastly, we developed an experimental system to evaluate the performance of our method.
引用
收藏
页码:435 / 442
页数:8
相关论文
共 50 条
  • [31] IPv6 active address detection model based on diffusion model
    Yang, Wei
    Wang, Qianyi
    Yao, Yu
    COMPUTER NETWORKS, 2025, 261
  • [32] Research on IPv6 Intrusion Detection System Snort-based
    Shen Zihao
    Wang Hui
    2010 INTERNATIONAL CONFERENCE ON DISPLAY AND PHOTONICS, 2010, 7749
  • [33] IPv6 based mobile routing
    Fritsche, W
    CONVERGED NETWORKING: DATA AND REAL-TIME COMMUNICATIONS OVER IP, 2003, 119 : 121 - 132
  • [34] Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms
    Bahashwan, Abdullah Ahmed
    Anbar, Mohammed
    Hanshi, Sabri M.
    ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 153 - 167
  • [35] A Design Proposer on Policy Framework in IPV6 Network
    Adeniji, S. D.
    Khatun, S.
    Borhan, M. A.
    Raja, R. S. A.
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 2613 - 2618
  • [36] A policy controlled IPv4/IPv6 network emulation environment
    Grgic, Tomislav
    Matijasevic, Maja
    SOFTCOM 2007: 15TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2007, : 234 - 238
  • [37] Policy Based Mobility & Flow Management for IPv6 Heterogeneous Wireless Networks
    Shen, Chong
    Du, Wencai
    Atkinson, Robert
    Kwong, Kae Hsiang
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 62 (02) : 329 - 361
  • [38] Policy Based Mobility & Flow Management for IPv6 Heterogeneous Wireless Networks
    Chong Shen
    Wencai Du
    Robert Atkinson
    Kae Hsiang Kwong
    Wireless Personal Communications, 2012, 62 : 329 - 361
  • [39] A time and distance - Based multicast algorithm for IPv6 mobile networks
    Hsu, WH
    Lee, BH
    Liu, MH
    Shen, BY
    Lin, KH
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1 (LONG PAPERS), PROCEEDINGS, 2004, : 464 - 469
  • [40] Transition to the IPv6 network environment by using the SOCKS-based IPv6/IPv4 translator
    Kitamura, H
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (09) : 1740 - 1748