INSPIRING FUTURES

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations.

Saliou, Lionel, Buchanan, William J, Graves, Jamie and Munoz, Jose (2006) Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: 5th European Conference on Information Warfare and Security, 1 - 2 June 2006, Helsinki, Finland.

[img]
Preview
PDF (This paper demonstrates that limits for security devices must be understood before an automated security system can be created)
Available under License Creative Commons Attribution Non-commercial.

Download (250kB) | Preview

    Abstract/Description

    Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical structure of an organisation should be visible within the configuration of networks. Hence, it is desirable for a distributed system to be capable of reconfiguring itself in a timely-manner to reflect changes in policy, in practices, and in the social hierarchy, such as the promotion of a member of staff, or in the face of a security threat, such as in malware propagation.

    This paper builds on the concept of an automated mitigation and reconfiguration system for networked devices, and evaluates key firewall system performance tests. These could be important in defining the criteria for the success of this type of security implementation. It thus defines a range of experiments, which evaluate firewall parameters, such as number of rules, and their position in relation to performance metrics, such as CPU utilisation, bandwidth consumption, and network latency. The paper also includes tests with up to 65,000 rules, and presents results on the positions of the rules, such as on the incoming and outgoing ports, and the effect of different network throughputs.

    It concludes that networks can be made more resilient, under heavy network loads and large rule sets, if rule sets are applied on the outgoing ports. It also shows evidence that configuration interfaces are the performance bottleneck for multi-agent systems that may use these to reconfigure network equipments dynamically.

    Item Type: Conference or Workshop Item (Paper)
    ISBN: 1905305206 & 9781905305209
    Additional Information: Published in: Remenyi, Dan (ed.) 5th European Conference on Information Warfare and Security, National Defence College Helsinki, Finland, 1 - 2 June 2006. Reading:Academic Conferences, 2006. ISBN: 1905305206. ISBN-13 9781905305209.
    Uncontrolled Keywords: Computer networks; Firewall performance; Automated reconfiguration; Automated mitigation; Evaluation; Configuration interface bottleneck;
    University Divisions/Research Centres: Faculty of Engineering, Computing and Creative Industries > School of Computing
    Dewey Decimal Subjects: 000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security
    Library of Congress Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
    Item ID: 2601
    Depositing User: Lionel Saliou
    Date Deposited: 27 May 2009 12:39
    Last Modified: 18 Jun 2012 14:14
    URI: http://researchrepository.napier.ac.uk/id/eprint/2601

    Actions (login required)

    View Item

    Document Downloads

    More statistics for this item...

    Edinburgh Napier University is a registered Scottish charity. Registration number SC018373