Saliou, Lionel, Buchanan, William J, Graves, Jamie and Munoz, Jose (2006) Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: 5th European Conference on Information Warfare and Security, 1 - 2 June 2006, Helsinki, Finland.
PDF (This paper demonstrates that limits for security devices must be understood before an automated security system can be created)
Available under License Creative Commons Attribution Non-commercial.
Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical structure of an organisation should be visible within the configuration of networks. Hence, it is desirable for a distributed system to be capable of reconfiguring itself in a timely-manner to reflect changes in policy, in practices, and in the social hierarchy, such as the promotion of a member of staff, or in the face of a security threat, such as in malware propagation.
This paper builds on the concept of an automated mitigation and reconfiguration system for networked devices, and evaluates key firewall system performance tests. These could be important in defining the criteria for the success of this type of security implementation. It thus defines a range of experiments, which evaluate firewall parameters, such as number of rules, and their position in relation to performance metrics, such as CPU utilisation, bandwidth consumption, and network latency. The paper also includes tests with up to 65,000 rules, and presents results on the positions of the rules, such as on the incoming and outgoing ports, and the effect of different network throughputs.
It concludes that networks can be made more resilient, under heavy network loads and large rule sets, if rule sets are applied on the outgoing ports. It also shows evidence that configuration interfaces are the performance bottleneck for multi-agent systems that may use these to reconfigure network equipments dynamically.
|Item Type:||Conference or Workshop Item (Paper)|
|ISBN:||1905305206 & 9781905305209|
|Additional Information:||Published in: Remenyi, Dan (ed.) 5th European Conference on Information Warfare and Security, National Defence College Helsinki, Finland, 1 - 2 June 2006. Reading:Academic Conferences, 2006. ISBN: 1905305206. ISBN-13 9781905305209.|
|Uncontrolled Keywords:||Computer networks; Firewall performance; Automated reconfiguration; Automated mitigation; Evaluation; Configuration interface bottleneck;|
|University Divisions/Research Centres:||Faculty of Engineering, Computing and Creative Industries > School of Computing|
|Dewey Decimal Subjects:||000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security|
|Library of Congress Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
|Depositing User:||Lionel Saliou|
|Date Deposited:||27 May 2009 11:39|
|Last Modified:||18 Jun 2012 13:14|
Actions (login required)
Downloads per month over past year