Cross-Domain Privacy-Preserving Cooperative Firewall Optimization

被引:11
|
作者
Chen, Fei [1 ]
Bruhadeshwar, Bezawada [3 ]
Liu, Alex X. [2 ]
机构
[1] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[2] Nanjing Univ, Dept Comp Sci & Technol, Nanjing 210093, Jiangsu, Peoples R China
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
基金
美国国家科学基金会;
关键词
Firewall optimization; privacy; PACKET CLASSIFIERS;
D O I
10.1109/TNET.2012.2217985
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the packet based on its policy. Optimizing firewall policies is crucial for improving network performance. Prior work on firewall optimization focuses on either intrafirewall or interfirewall optimization within one administrative domain where the privacy of firewall policies is not a concern. This paper explores interfirewall optimization across administrative domains for the first time. The key technical challenge is that firewall policies cannot be shared across domains because a firewall policy contains confidential information and even potential security holes, which can be exploited by attackers. In this paper, we propose the first cross-domain privacy-preserving cooperative firewall policy optimization protocol. Specifically, for any two adjacent firewalls belonging to two different administrative domains, our protocol can identify in each firewall the rules that can be removed because of the other firewall. The optimization process involves cooperative computation between the two firewalls without any party disclosing its policy to the other. We implemented our protocol and conducted extensive experiments. The results on real firewall policies show that our protocol can remove as many as 49% of the rules in a firewall, whereas the average is 19.4%. The communication cost is less than a few hundred kilobytes. Our protocol incurs no extra online packet processing overhead, and the offline processing time is less than a few hundred seconds.
引用
收藏
页码:857 / 868
页数:12
相关论文
共 50 条
  • [31] Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks
    Zhu, Liehuang
    Tang, Xiangyun
    Shen, Meng
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (03) : 628 - 643
  • [32] Privacy-preserving cooperative positioning
    Hernandez, Guillermo
    LaMountain, Gerald
    Closas, Pau
    [J]. PROCEEDINGS OF THE 33RD INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2020), 2020, : 2667 - 2675
  • [33] Win-Win: A Privacy-Preserving Federated Framework for Dual-Target Cross-Domain Recommendation
    Chen, Gaode
    Zhang, Xinghua
    Su, Yijun
    Lai, Yantong
    Xiang, Ji
    Zhang, Junbo
    Zheng, Yu
    [J]. THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 4, 2023, : 4149 - 4156
  • [34] Efficient and Privacy-Preserving Blockchain-Based Multifactor Device Authentication Protocol for Cross-Domain IIoT
    Zhang, Yan
    Li, Bing
    Wu, Jiaxin
    Liu, Bo
    Chen, Rui
    Chang, Jinke
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 22501 - 22515
  • [35] A Privacy-Preserving Cross-Domain Healthcare Wearables Recommendation Algorithm Based on Domain-Dependent and Domain-Independent Feature Fusion
    Yu, Xu
    Zhan, Dingjia
    Liu, Lei
    Lv, Hongwu
    Xu, Lingwei
    Du, Junwei
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 1928 - 1936
  • [36] Privacy-preserving cooperative scientific computations
    Du, WL
    Atallah, MJ
    [J]. 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 273 - 282
  • [37] Privacy-Preserving Cooperative GNSS Positioning
    Hernandez, Guillermo
    LaMountain, Gerald
    Closas, Pau
    [J]. NAVIGATION-JOURNAL OF THE INSTITUTE OF NAVIGATION, 2023, 70 (04):
  • [38] Privacy-Preserving Cooperative Route Planning
    Florian, Martin
    Finster, Soeren
    Baumgart, Ingmar
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (06): : 590 - 599
  • [39] Privacy-preserving cooperative statistical analysis
    Du, WL
    Atallah, MJ
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 102 - 110
  • [40] DBCPCA:Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs
    Guo, Xian
    Lu, Xiangrong
    Jiang, Yongbo
    Fang, Junli
    Zhang, Di
    [J]. AD HOC NETWORKS, 2024, 163