Performance Modeling and Analysis of Network Firewalls

Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Di...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE eTransactions on network and service management 2012-03, Vol.9 (1), p.12-21
Hauptverfasser: Salah, K., Elbadawi, K., Boutaba, R.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 21
container_issue 1
container_start_page 12
container_title IEEE eTransactions on network and service management
container_volume 9
creator Salah, K.
Elbadawi, K.
Boutaba, R.
description Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Distributed Denial of Service) attacks as those commonly launched by today's Botnets. In this paper, we present an analytical queueing model based on the embedded Markov chain to study and analyze the performance of rule-based firewalls when subjected to normal traffic flows as well as DoS attack flows targeting different rule positions. We derive equations for key features and performance measures of engineering and design significance. These features and measures include throughput, packet loss, packet delay, and firewall's CPU utilization. In addition, we verify and validate our analytical model using simulation and real experimental measurements.
doi_str_mv 10.1109/TNSM.2011.122011.110151
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_6112159</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6112159</ieee_id><sourcerecordid>1019651473</sourcerecordid><originalsourceid>FETCH-LOGICAL-c403t-8053d873274b4dbc1de577fb265d921a8babbb6bc3af071a633e8df6de31f22a3</originalsourceid><addsrcrecordid>eNpdkMFKAzEURYMoWKtf4MLBlZupeckkmSxLsSq0VbCuQzJJZOp0UpOW0r93yoiIq_sW5154B6EbwCMALO-Xi7f5iGCAEZA-AAODEzQASUleMCpO_9zn6CKlFcasBEkGiL-66ENc67Zy2TxY19TtR6Zbm41b3RxSnbLgs4Xb7kP8zKZ1dHvdNOkSnXndJHf1k0P0Pn1YTp7y2cvj82Q8y6sC021eYkZtKSgRhSmsqcA6JoQ3hDMrCejSaGMMNxXVHgvQnFJXWs-to-AJ0XSI7vrdTQxfO5e2al2nyjWNbl3YJdW9KjmDQtAOvf2HrsIudk8kJQmTmPESd5DooSqGlKLzahPrtY6HbkkddaqjTnX0qHqdqtfZNa_7Zu2c-21xAAJM0m_2oHBi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>925905680</pqid></control><display><type>article</type><title>Performance Modeling and Analysis of Network Firewalls</title><source>IEEE Electronic Library (IEL)</source><creator>Salah, K. ; Elbadawi, K. ; Boutaba, R.</creator><creatorcontrib>Salah, K. ; Elbadawi, K. ; Boutaba, R.</creatorcontrib><description>Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Distributed Denial of Service) attacks as those commonly launched by today's Botnets. In this paper, we present an analytical queueing model based on the embedded Markov chain to study and analyze the performance of rule-based firewalls when subjected to normal traffic flows as well as DoS attack flows targeting different rule positions. We derive equations for key features and performance measures of engineering and design significance. These features and measures include throughput, packet loss, packet delay, and firewall's CPU utilization. In addition, we verify and validate our analytical model using simulation and real experimental measurements.</description><identifier>ISSN: 1932-4537</identifier><identifier>EISSN: 1932-4537</identifier><identifier>DOI: 10.1109/TNSM.2011.122011.110151</identifier><identifier>CODEN: ITNSC4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Analytical models ; Computer crime ; Equations ; Firewalls ; Internet ; Kernel ; Mathematical analysis ; Mathematical model ; Mathematical models ; Network firewalls ; Network security ; Networks ; performance analysis ; performance modeling ; Queueing analysis ; queueing systems ; Security ; Servers ; Studies ; Throughput ; Traffic flow</subject><ispartof>IEEE eTransactions on network and service management, 2012-03, Vol.9 (1), p.12-21</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Mar 2012</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c403t-8053d873274b4dbc1de577fb265d921a8babbb6bc3af071a633e8df6de31f22a3</citedby><cites>FETCH-LOGICAL-c403t-8053d873274b4dbc1de577fb265d921a8babbb6bc3af071a633e8df6de31f22a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6112159$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,781,785,797,27926,27927,54760</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6112159$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Salah, K.</creatorcontrib><creatorcontrib>Elbadawi, K.</creatorcontrib><creatorcontrib>Boutaba, R.</creatorcontrib><title>Performance Modeling and Analysis of Network Firewalls</title><title>IEEE eTransactions on network and service management</title><addtitle>T-NSM</addtitle><description>Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Distributed Denial of Service) attacks as those commonly launched by today's Botnets. In this paper, we present an analytical queueing model based on the embedded Markov chain to study and analyze the performance of rule-based firewalls when subjected to normal traffic flows as well as DoS attack flows targeting different rule positions. We derive equations for key features and performance measures of engineering and design significance. These features and measures include throughput, packet loss, packet delay, and firewall's CPU utilization. In addition, we verify and validate our analytical model using simulation and real experimental measurements.</description><subject>Analytical models</subject><subject>Computer crime</subject><subject>Equations</subject><subject>Firewalls</subject><subject>Internet</subject><subject>Kernel</subject><subject>Mathematical analysis</subject><subject>Mathematical model</subject><subject>Mathematical models</subject><subject>Network firewalls</subject><subject>Network security</subject><subject>Networks</subject><subject>performance analysis</subject><subject>performance modeling</subject><subject>Queueing analysis</subject><subject>queueing systems</subject><subject>Security</subject><subject>Servers</subject><subject>Studies</subject><subject>Throughput</subject><subject>Traffic flow</subject><issn>1932-4537</issn><issn>1932-4537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkMFKAzEURYMoWKtf4MLBlZupeckkmSxLsSq0VbCuQzJJZOp0UpOW0r93yoiIq_sW5154B6EbwCMALO-Xi7f5iGCAEZA-AAODEzQASUleMCpO_9zn6CKlFcasBEkGiL-66ENc67Zy2TxY19TtR6Zbm41b3RxSnbLgs4Xb7kP8zKZ1dHvdNOkSnXndJHf1k0P0Pn1YTp7y2cvj82Q8y6sC021eYkZtKSgRhSmsqcA6JoQ3hDMrCejSaGMMNxXVHgvQnFJXWs-to-AJ0XSI7vrdTQxfO5e2al2nyjWNbl3YJdW9KjmDQtAOvf2HrsIudk8kJQmTmPESd5DooSqGlKLzahPrtY6HbkkddaqjTnX0qHqdqtfZNa_7Zu2c-21xAAJM0m_2oHBi</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Salah, K.</creator><creator>Elbadawi, K.</creator><creator>Boutaba, R.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201203</creationdate><title>Performance Modeling and Analysis of Network Firewalls</title><author>Salah, K. ; Elbadawi, K. ; Boutaba, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c403t-8053d873274b4dbc1de577fb265d921a8babbb6bc3af071a633e8df6de31f22a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Analytical models</topic><topic>Computer crime</topic><topic>Equations</topic><topic>Firewalls</topic><topic>Internet</topic><topic>Kernel</topic><topic>Mathematical analysis</topic><topic>Mathematical model</topic><topic>Mathematical models</topic><topic>Network firewalls</topic><topic>Network security</topic><topic>Networks</topic><topic>performance analysis</topic><topic>performance modeling</topic><topic>Queueing analysis</topic><topic>queueing systems</topic><topic>Security</topic><topic>Servers</topic><topic>Studies</topic><topic>Throughput</topic><topic>Traffic flow</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Salah, K.</creatorcontrib><creatorcontrib>Elbadawi, K.</creatorcontrib><creatorcontrib>Boutaba, R.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE eTransactions on network and service management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Salah, K.</au><au>Elbadawi, K.</au><au>Boutaba, R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance Modeling and Analysis of Network Firewalls</atitle><jtitle>IEEE eTransactions on network and service management</jtitle><stitle>T-NSM</stitle><date>2012-03</date><risdate>2012</risdate><volume>9</volume><issue>1</issue><spage>12</spage><epage>21</epage><pages>12-21</pages><issn>1932-4537</issn><eissn>1932-4537</eissn><coden>ITNSC4</coden><abstract>Network firewalls act as the first line of defense against unwanted and malicious traffic targeting Internet servers. Predicting the overall firewall performance is crucial to network security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Distributed Denial of Service) attacks as those commonly launched by today's Botnets. In this paper, we present an analytical queueing model based on the embedded Markov chain to study and analyze the performance of rule-based firewalls when subjected to normal traffic flows as well as DoS attack flows targeting different rule positions. We derive equations for key features and performance measures of engineering and design significance. These features and measures include throughput, packet loss, packet delay, and firewall's CPU utilization. In addition, we verify and validate our analytical model using simulation and real experimental measurements.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNSM.2011.122011.110151</doi><tpages>10</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1932-4537
ispartof IEEE eTransactions on network and service management, 2012-03, Vol.9 (1), p.12-21
issn 1932-4537
1932-4537
language eng
recordid cdi_ieee_primary_6112159
source IEEE Electronic Library (IEL)
subjects Analytical models
Computer crime
Equations
Firewalls
Internet
Kernel
Mathematical analysis
Mathematical model
Mathematical models
Network firewalls
Network security
Networks
performance analysis
performance modeling
Queueing analysis
queueing systems
Security
Servers
Studies
Throughput
Traffic flow
title Performance Modeling and Analysis of Network Firewalls
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T11%3A53%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20Modeling%20and%20Analysis%20of%20Network%20Firewalls&rft.jtitle=IEEE%20eTransactions%20on%20network%20and%20service%20management&rft.au=Salah,%20K.&rft.date=2012-03&rft.volume=9&rft.issue=1&rft.spage=12&rft.epage=21&rft.pages=12-21&rft.issn=1932-4537&rft.eissn=1932-4537&rft.coden=ITNSC4&rft_id=info:doi/10.1109/TNSM.2011.122011.110151&rft_dat=%3Cproquest_RIE%3E1019651473%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=925905680&rft_id=info:pmid/&rft_ieee_id=6112159&rfr_iscdi=true