RUS  ENG
Full version
JOURNALS // Modelirovanie i Analiz Informatsionnykh Sistem // Archive

Model. Anal. Inform. Sist., 2019 Volume 26, Number 1, Pages 75–89 (Mi mais665)

This article is cited in 2 papers

Computer Networks and Communications

An effective algorithm for collision resolution in security policy rules

S. V. Morzhova, V. A. Sokolovb

a P.G. Demidov Yaroslavl State University, 14 Sovetskaya st., Yaroslavl, 150003, Russia
b Centre of Integrable Systems, P.G. Demidov Yaroslavl State University, 14 Sovetskaya st., Yaroslavl, 150003, Russia

Abstract: A firewall is the main classic tool for monitoring and managing the network traffic on a local network. Its task is to compare the network traffic passing through it with the established security rules. These rules, which are often also called security policy, can be defined both before and during the operation of the firewall. Managing the security policy of large corporate networks is a complex task. In order to properly implement it, firewall filtering rules must be written and organized neatly and without errors. In addition, the process of changing or inserting new rules should be performed only after a careful analysis of the relationship between the rules being modified or inserted, as well as the rules that already exist in the security policy. In this article, the authors consider the classification of relations between security policy rules and also give the definition of all sorts of conflicts between them. In addition, the authors present a new efficient algorithm for detecting and resolving collisions in firewall rules by the example of the Floodlight SDN controller.

Keywords: access control list, firewall, software defined network, ACL, SDN, security policy tree.

UDC: 004.7

Received: 15.12.2018
Revised: 14.01.2019
Accepted: 18.02.2019

DOI: 10.18255/1818-1015-2019-1-75-89



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024