首页> 外文会议>2nd international conference on security of information and networks 2009 >Resiliency of Open-Source Firewalls against Remote Discovery of Last-Matching Rules
【24h】

Resiliency of Open-Source Firewalls against Remote Discovery of Last-Matching Rules

机译:开源防火墙针对远程发现最后匹配规则的弹性

获取原文

摘要

In today's networks, firewalls act as the first line of defense against unwanted and malicious traffics. Firewalls themselves can become targets of DoS attacks, thus jeopardizing their primary operation to filter traffic. Typically, packets are checked against a firewall policy consisting (in many cases) of thousands of rules. Last-matching rules are located at the bottom of the ruleset and consume the most CPU processing power of firewalls. If these rules get discovered by an attacker, the attacker can effectively launch a low-rate DoS attack that can bring the firewall to its knees. In prior work [1], we proposed and evaluated a technique to remotely discover the last matching rules of the Linux Netfilter firewall. In this paper, we examine the effectiveness of such technique on the discovery of last-matching rules in two other popular open-source network firewalls, namely Linux IPSets and FreeBSD ipfw.
机译:在当今的网络中,防火墙是抵御有害和恶意流量的第一道防线。防火墙本身可以成为DoS攻击的目标,从而危及其用于过滤流量的主要操作。通常,根据防火墙策略(在许多情况下)包含数千个规则来检查数据包。最后匹配的规则位于规则集的底部,消耗防火墙最多的CPU处理能力。如果攻击者发现了这些规则,则攻击者可以有效地发起低速DoS攻击,从而使防火墙屈服。在先前的工作[1]中,我们提出并评估了一种远程发现Linux Netfilter防火墙的最后匹配规则的技术。在本文中,我们研究了这种技术在发现另外两个流行的开源网络防火墙(Linux IPSets和FreeBSD ipfw)中最后匹配规则方面的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号