Performance Modeling and Analysis of Network Firewalls
Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Di...
Gespeichert in:
Veröffentlicht in: | IEEE eTransactions on network and service management 2012-03, Vol.9 (1), p.12-21 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 21 |
---|---|
container_issue | 1 |
container_start_page | 12 |
container_title | IEEE eTransactions on network and service management |
container_volume | 9 |
creator | Salah, K. Elbadawi, K. Boutaba, R. |
description | Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Distributed Denial of Service) attacks as those commonly launched by today's Botnets. In this paper, we present an analytical queueing model based on the embedded Markov chain to study and analyze the performance of rule-based firewalls when subjected to normal traffic flows as well as DoS attack flows targeting different rule positions. We derive equations for key features and performance measures of engineering and design significance. These features and measures include throughput, packet loss, packet delay, and firewall's CPU utilization. In addition, we verify and validate our analytical model using simulation and real experimental measurements. |
doi_str_mv | 10.1109/TNSM.2011.122011.110151 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_6112159</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6112159</ieee_id><sourcerecordid>1019651473</sourcerecordid><originalsourceid>FETCH-LOGICAL-c403t-8053d873274b4dbc1de577fb265d921a8babbb6bc3af071a633e8df6de31f22a3</originalsourceid><addsrcrecordid>eNpdkMFKAzEURYMoWKtf4MLBlZupeckkmSxLsSq0VbCuQzJJZOp0UpOW0r93yoiIq_sW5154B6EbwCMALO-Xi7f5iGCAEZA-AAODEzQASUleMCpO_9zn6CKlFcasBEkGiL-66ENc67Zy2TxY19TtR6Zbm41b3RxSnbLgs4Xb7kP8zKZ1dHvdNOkSnXndJHf1k0P0Pn1YTp7y2cvj82Q8y6sC021eYkZtKSgRhSmsqcA6JoQ3hDMrCejSaGMMNxXVHgvQnFJXWs-to-AJ0XSI7vrdTQxfO5e2al2nyjWNbl3YJdW9KjmDQtAOvf2HrsIudk8kJQmTmPESd5DooSqGlKLzahPrtY6HbkkddaqjTnX0qHqdqtfZNa_7Zu2c-21xAAJM0m_2oHBi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>925905680</pqid></control><display><type>article</type><title>Performance Modeling and Analysis of Network Firewalls</title><source>IEEE Electronic Library (IEL)</source><creator>Salah, K. ; Elbadawi, K. ; Boutaba, R.</creator><creatorcontrib>Salah, K. ; Elbadawi, K. ; Boutaba, R.</creatorcontrib><description>Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Distributed Denial of Service) attacks as those commonly launched by today's Botnets. In this paper, we present an analytical queueing model based on the embedded Markov chain to study and analyze the performance of rule-based firewalls when subjected to normal traffic flows as well as DoS attack flows targeting different rule positions. We derive equations for key features and performance measures of engineering and design significance. These features and measures include throughput, packet loss, packet delay, and firewall's CPU utilization. In addition, we verify and validate our analytical model using simulation and real experimental measurements.</description><identifier>ISSN: 1932-4537</identifier><identifier>EISSN: 1932-4537</identifier><identifier>DOI: 10.1109/TNSM.2011.122011.110151</identifier><identifier>CODEN: ITNSC4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Analytical models ; Computer crime ; Equations ; Firewalls ; Internet ; Kernel ; Mathematical analysis ; Mathematical model ; Mathematical models ; Network firewalls ; Network security ; Networks ; performance analysis ; performance modeling ; Queueing analysis ; queueing systems ; Security ; Servers ; Studies ; Throughput ; Traffic flow</subject><ispartof>IEEE eTransactions on network and service management, 2012-03, Vol.9 (1), p.12-21</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Mar 2012</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c403t-8053d873274b4dbc1de577fb265d921a8babbb6bc3af071a633e8df6de31f22a3</citedby><cites>FETCH-LOGICAL-c403t-8053d873274b4dbc1de577fb265d921a8babbb6bc3af071a633e8df6de31f22a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6112159$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,781,785,797,27926,27927,54760</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6112159$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Salah, K.</creatorcontrib><creatorcontrib>Elbadawi, K.</creatorcontrib><creatorcontrib>Boutaba, R.</creatorcontrib><title>Performance Modeling and Analysis of Network Firewalls</title><title>IEEE eTransactions on network and service management</title><addtitle>T-NSM</addtitle><description>Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Distributed Denial of Service) attacks as those commonly launched by today's Botnets. In this paper, we present an analytical queueing model based on the embedded Markov chain to study and analyze the performance of rule-based firewalls when subjected to normal traffic flows as well as DoS attack flows targeting different rule positions. We derive equations for key features and performance measures of engineering and design significance. These features and measures include throughput, packet loss, packet delay, and firewall's CPU utilization. In addition, we verify and validate our analytical model using simulation and real experimental measurements.</description><subject>Analytical models</subject><subject>Computer crime</subject><subject>Equations</subject><subject>Firewalls</subject><subject>Internet</subject><subject>Kernel</subject><subject>Mathematical analysis</subject><subject>Mathematical model</subject><subject>Mathematical models</subject><subject>Network firewalls</subject><subject>Network security</subject><subject>Networks</subject><subject>performance analysis</subject><subject>performance modeling</subject><subject>Queueing analysis</subject><subject>queueing systems</subject><subject>Security</subject><subject>Servers</subject><subject>Studies</subject><subject>Throughput</subject><subject>Traffic flow</subject><issn>1932-4537</issn><issn>1932-4537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkMFKAzEURYMoWKtf4MLBlZupeckkmSxLsSq0VbCuQzJJZOp0UpOW0r93yoiIq_sW5154B6EbwCMALO-Xi7f5iGCAEZA-AAODEzQASUleMCpO_9zn6CKlFcasBEkGiL-66ENc67Zy2TxY19TtR6Zbm41b3RxSnbLgs4Xb7kP8zKZ1dHvdNOkSnXndJHf1k0P0Pn1YTp7y2cvj82Q8y6sC021eYkZtKSgRhSmsqcA6JoQ3hDMrCejSaGMMNxXVHgvQnFJXWs-to-AJ0XSI7vrdTQxfO5e2al2nyjWNbl3YJdW9KjmDQtAOvf2HrsIudk8kJQmTmPESd5DooSqGlKLzahPrtY6HbkkddaqjTnX0qHqdqtfZNa_7Zu2c-21xAAJM0m_2oHBi</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Salah, K.</creator><creator>Elbadawi, K.</creator><creator>Boutaba, R.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201203</creationdate><title>Performance Modeling and Analysis of Network Firewalls</title><author>Salah, K. ; Elbadawi, K. ; Boutaba, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c403t-8053d873274b4dbc1de577fb265d921a8babbb6bc3af071a633e8df6de31f22a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Analytical models</topic><topic>Computer crime</topic><topic>Equations</topic><topic>Firewalls</topic><topic>Internet</topic><topic>Kernel</topic><topic>Mathematical analysis</topic><topic>Mathematical model</topic><topic>Mathematical models</topic><topic>Network firewalls</topic><topic>Network security</topic><topic>Networks</topic><topic>performance analysis</topic><topic>performance modeling</topic><topic>Queueing analysis</topic><topic>queueing systems</topic><topic>Security</topic><topic>Servers</topic><topic>Studies</topic><topic>Throughput</topic><topic>Traffic flow</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Salah, K.</creatorcontrib><creatorcontrib>Elbadawi, K.</creatorcontrib><creatorcontrib>Boutaba, R.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE eTransactions on network and service management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Salah, K.</au><au>Elbadawi, K.</au><au>Boutaba, R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance Modeling and Analysis of Network Firewalls</atitle><jtitle>IEEE eTransactions on network and service management</jtitle><stitle>T-NSM</stitle><date>2012-03</date><risdate>2012</risdate><volume>9</volume><issue>1</issue><spage>12</spage><epage>21</epage><pages>12-21</pages><issn>1932-4537</issn><eissn>1932-4537</eissn><coden>ITNSC4</coden><abstract>Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Distributed Denial of Service) attacks as those commonly launched by today's Botnets. In this paper, we present an analytical queueing model based on the embedded Markov chain to study and analyze the performance of rule-based firewalls when subjected to normal traffic flows as well as DoS attack flows targeting different rule positions. We derive equations for key features and performance measures of engineering and design significance. These features and measures include throughput, packet loss, packet delay, and firewall's CPU utilization. In addition, we verify and validate our analytical model using simulation and real experimental measurements.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNSM.2011.122011.110151</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1932-4537 |
ispartof | IEEE eTransactions on network and service management, 2012-03, Vol.9 (1), p.12-21 |
issn | 1932-4537 1932-4537 |
language | eng |
recordid | cdi_ieee_primary_6112159 |
source | IEEE Electronic Library (IEL) |
subjects | Analytical models Computer crime Equations Firewalls Internet Kernel Mathematical analysis Mathematical model Mathematical models Network firewalls Network security Networks performance analysis performance modeling Queueing analysis queueing systems Security Servers Studies Throughput Traffic flow |
title | Performance Modeling and Analysis of Network Firewalls |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T11%3A53%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20Modeling%20and%20Analysis%20of%20Network%20Firewalls&rft.jtitle=IEEE%20eTransactions%20on%20network%20and%20service%20management&rft.au=Salah,%20K.&rft.date=2012-03&rft.volume=9&rft.issue=1&rft.spage=12&rft.epage=21&rft.pages=12-21&rft.issn=1932-4537&rft.eissn=1932-4537&rft.coden=ITNSC4&rft_id=info:doi/10.1109/TNSM.2011.122011.110151&rft_dat=%3Cproquest_RIE%3E1019651473%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=925905680&rft_id=info:pmid/&rft_ieee_id=6112159&rfr_iscdi=true |