A probing technique for discovering last-matching rules of a network firewall

K. Salah, K. Sattar, M. Sqalli, Ehab Al-Shaer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

In this paper we identify a potential probing technique for discovering the last-matching rules of the security of a firewall. The last-matching rules are those rules are located at the bottom of the ruleset of a firewall's policy, and would require the most processing time the firewall. If these rules are discovered, an attacker can launch an effective low-rate DoS attack to trigger case or near worst-case processing, and thereby the firewall and bringing it to its knees. As a of concept, we developed a prototype program that the detection algorithm and validated its effectiveness experimentally.

Original languageBritish English
Title of host publication2008 International Conference on Innovations in Information Technology, IIT 2008
Pages578-582
Number of pages5
DOIs
StatePublished - 2008
Event2008 International Conference on Innovations in Information Technology, IIT 2008 - Al Ain, United Arab Emirates
Duration: 16 Dec 200818 Dec 2008

Publication series

Name2008 International Conference on Innovations in Information Technology, IIT 2008

Conference

Conference2008 International Conference on Innovations in Information Technology, IIT 2008
Country/TerritoryUnited Arab Emirates
CityAl Ain
Period16/12/0818/12/08

Fingerprint

Dive into the research topics of 'A probing technique for discovering last-matching rules of a network firewall'. Together they form a unique fingerprint.

Cite this