P Erformance C Haracteristics of Bdd - B Ased

نویسنده

  • Adi Attar
چکیده

Packet filters are security devices that connect multiple packet-based networks and provide access control between them. The security policy enforced by a packet filter is specified as a set of rules, called an access list, that describes what types of network packets should be allowed to pass from one network to another, and what types should be discarded. These rules are expressed in terms of the values of the fields of the packet headers. The semantics of an access list dictate that the first rule that matches a packet determines the action taken by the packet filter. Traditional packet filters evaluate the rules in an access list sequentially until a matching rule is found and this process is repeated for every packet passing through the filter. The latency incurred by this sequential lookup is proportional to the number of rules in the list. While this is not a problem for short access lists, long access lists can cause significant system degradation. Also long access lists typically occur at high-bandwidth network interfaces such as on border routers, where fast packet processing is essential. This research is based on the observation that an alternative internal representation of an access list can eliminate the need for sequential lookup and hence provide better filtering performance. The representation proposed in this research follows from the fact that the policy of an access list can be expressed as a single Boolean expression relating the values of bits in the packet headers. Thus binary decision diagrams (BDDs), capable of providing compact representations for many Boolean expressions, are used as a basis for the representation of access lists in this study. The contribution of this research is an evaluation of the effectiveness of representing access lists using BDDs for the purposes of packet filtering performance. Both time and memory issues are considered. This evaluation contains both analytical and empirical aspects and shows that the proposed approach provides good time and space performance for packet filtering on medium to long access lists. Furthermore, using BDDs for the representation of access lists provides packet filters with other useful characteristics that makes this a beneficial approach to filtering in many real and important situations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

F Ault D Iagnosis in B Raking S Ystem of M Ine H Oist B Ased on the M Oment C Haracteristics

Fault diagnosis method based on the moment characteristic of system pressure data is presented in this paper. Using AMESim simulation technology, three typical faults of the brake system are studied. After the moment and the percentile characteristics of the pressure curve of the hydraulic system are extracted and used as characteristic parameter, fault information is diagnosed effectively usin...

متن کامل

P Erformance a Nalysis of S Ymmetric K Ey C Iphers in L Inear and G Rid B Ased S Ensor N Etworks

The linear and grid based Wireless Sensor Networks (WSN) are formed by applications where objects being monitored are either placed in linear or grid based form. E.g. monitoring oil, water or gas pipelines; perimeter surveillance; monitoring traffic level of city streets, goods warehouse monitoring. The security of data is a critical issue for all such applications and as the devices used for t...

متن کامل

P Erformance a Nalysis of S Ymmetric K Ey C Iphers in L Inear and G Rid B Ased S Ensor

The linear and grid based Wireless Sensor Networks (WSN) are formed by applications where objects being monitored are either placed in linear or grid based form. E.g. monitoring oil, water or gas pipelines; perimeter surveillance; monitoring traffic level of city streets, goods warehouse monitoring. The security of data is a critical issue for all such applications and as the devices used for t...

متن کامل

A Singular Value Decomposition-Based Method for Solving a Deterministic Adaptive Problem

A computational scheme based on the singular value ecomposition (SVD) for a deterministic, data domain pproach to the adaptive processing problem is presented. n the direct data domain approach, a single snapshot is onsidered for an assumed direction of arrival with unnown amplitude. This unknown signal strength is estiated on a snapshot by snapshot basis. The new SVD ased method is compared wi...

متن کامل

Recombinant canine B-domain-deleted FVIII exhibits high specific activity and is safe in the canine hemophilia A model.

Production of recombinant B-domain-deleted canine factor VIII (cFVIII-BDD) unexpectedly revealed superior protein yields with 3-fold increased specific activity relative to human FVIII-BDD (hFVIII-BDD). We also determined that activated cFVIII-BDD is more stable than activated hFVIII-BDD. Furthermore, cFVIII-BDD is efficient at inducing hemostasis in human plasma containing FVIII inhibitors. In...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001