Resiliency of open-source firewalls against remote discovery of last-matching rules

Khaled Salah, Karim Sattar, Zubair Baig, Mohammed Sqalli, Prasad Calyam

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In today's networks, firewalls act as the first line of defense against unwanted and malicious traffics. Firewalls themselves can become targets of DoS attacks, thus jeopardizing their primary operation to filter traffic. Typically, packets are checked against a firewall policy consisting (in many cases) of thousands of rules. Last-matching rules are located at the bottom of the ruleset and consume the most CPU processing power of firewalls. If these rules get discovered by an attacker, the attacker can effectively launch a low-rate DoS attack that can bring the firewall to its knees. In prior work [1], we proposed and evaluated a technique to remotely discover the last matching rules of the Linux Netfilter firewall. In this paper, we examine the effectiveness of such technique on the discovery of last-matching rules in two other popular open-source network firewalls, namely Linux IPSets and FreeBSD ipfw.

Original languageBritish English
Title of host publicationSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks
Pages186-192
Number of pages7
DOIs
StatePublished - 2009
Event2nd International Conference on Security of Information and Networks, SIN'09 - Famagusta, Cyprus
Duration: 6 Oct 200910 Oct 2009

Publication series

NameSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks

Conference

Conference2nd International Conference on Security of Information and Networks, SIN'09
Country/TerritoryCyprus
CityFamagusta
Period6/10/0910/10/09

Keywords

  • DoS attacks
  • Firewalls
  • Nework security

Fingerprint

Dive into the research topics of 'Resiliency of open-source firewalls against remote discovery of last-matching rules'. Together they form a unique fingerprint.

Cite this