A Conflict Detection Method for IPv6 Time-Based Firewall Policy

被引:2
|
作者
Zhang, Xue [1 ]
Yin, Yi [1 ]
Liu, Wei [1 ]
Peng, Zhizhen [1 ]
Zhang, Guoqiang [1 ]
Wang, Yun [2 ]
Tateiwa, Yuichiro [3 ]
Takahashi, Naohisa [3 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Peoples R China
[2] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Peoples R China
[3] Nagoya Inst Technol, Dept Comp Sci & Engn, Nagoya, Aichi, Japan
基金
中国国家自然科学基金;
关键词
firewall policy; time-based; IPv6; SMT Solver;
D O I
10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Firewalls have been a very important secure tool to protect networks against attacks, which usually filter the unauthorized traffic entering the secured network. The packet filleting based on a predefined collection of ordered rules. Along with the IPv6 protocol is widely used, and the security issues comes with it. Firewall for IPv6 network, as an important element to protect network security, it will be not able to filter packets correctly if there are conflicts that caused by the same packet matching two or more rules. In addition, a new kind of firewall with time constraint is used more and more widely by different firewall company, such as, ACLs of Cisco, Iptalbes of Linux, and the like. It is a hard work to manage the rules in IPv4 firewall policy, not to mention the rules in IPv6 time-based firewall policy. Many methods have been proposed to analyze and detect the conflicts of individual or distributed firewall policies. However, very few of them can deal with the time constraint of rules. Therefore, it is an urgent problem to detect the conflicts of the IPv6 time-based firewall policy. In order to solve this problem, we describe a method, which can analyze the IPv6 time-based firewall policy. We use a formal method to analyze the me: ' g of IPv6 time-based firewall policy. Next, we take the formal validation tool (SNIT solver 13) to detect all the possible conflicts between every two rules. Lastly, we developed an experimental system to evaluate the performance of our method.
引用
收藏
页码:435 / 442
页数:8
相关论文
共 50 条
  • [41] QoS based real time audio streaming on IPv6 networks
    Schmid, S
    Scott, A
    Hutchison, D
    Froitzheim, K
    INTERNET ROUTING AND QUALITY OF SERVICE, 1998, 3529 : 102 - 113
  • [42] An IPv6 Network Congestion Measurement Based on Network Time Protocol
    Pitimon, Itarun
    Nintanavongsa, Prusayon
    TENCON 2014 - 2014 IEEE REGION 10 CONFERENCE, 2014,
  • [43] IPv6 Network Attack Detection with HoneydV6
    Schindler, Sven
    Schnor, Bettina
    Kiertscher, Simon
    Scheffler, Thomas
    Zack, Eldad
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 252 - 269
  • [44] A Study on the Performance of IPv6-Based Mobility Protocols: Mobile IPv6 vs. Hierarchical Mobile IPv6
    Kong, Ki-Sik
    Roh, Sung-Ju
    Hwang, Chong-Sun
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2005, 1 (04) : 38 - 51
  • [45] Dynamic IPv6 Activation based Defense for IPv6 Router Advertisement Flooding (DoS) Attack
    Goel, Jai Narayan
    Mehtre, B. M.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 628 - 632
  • [46] Shellcode Detection in IPv6 Networks with HoneydV6
    Schindler, Sven
    Eggert, Oliver
    Schnor, Bettina
    Scheffler, Thomas
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 198 - 205
  • [47] Analysis and design of intrusion detection module based on IPv6 in Linux kernel
    Liu, C
    Li, ZH
    Proceedings of the World Engineers' Convention 2004, Vol A, Network Engineering and Information Society, 2004, : 267 - 270
  • [48] A Pull Model IPv6 Duplicate Address Detection
    Yao, Guang
    Bi, Jun
    Wang, Sen
    Zhang, Yueran
    Li, Yitian
    IEEE LOCAL COMPUTER NETWORK CONFERENCE, 2010, : 372 - 375
  • [49] Dynamical immune intrusion detection system for IPv6
    Yao, L
    Li, ZT
    Hao, T
    Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 374 - 381
  • [50] Evaluation of Intrusion Detection Systems in IPv6 Networks
    Schroetter, Max
    Scheffler, Thomas
    Schnor, Bettina
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 408 - 416