Could firewall rules be public - a game theoretical perspective

نویسندگان

  • Qi Liao
  • Zhen Li
  • Aaron Striegel
چکیده

Firewalls are among the most important components in network security. Traditionally, the rules of the firewall are kept private under the assumption that privacy of the ruleset makes attacks on the network more difficult. We posit that this assumption is no longer valid in the Internet of today due to two factors: the emergence of botnets reducing probing difficulty and second, the emergence of distributed applications where private rules increase the difficulty of troubleshooting. We argue that the enforcement of the policy is the key, not the secrecy of the policy itself. In this paper, we demonstrate through the application of game theory that public firewall rules when coupled with false information (lying) are actually better than keeping firewall rules private, especially when taken in the larger group context of the Internet. Interesting scenarios arise when honest, public firewalls are socially insured by other lying firewalls and networks adopting public firewalls become mutually beneficial to each other. The equilibrium under multiple-network game is socially optimal because the percentage of required lying firewalls in social optimum is much smaller than the percentage in single-network equilibrium and the chance of attacking through firewalls is further reduced to zero. Copyright © 2011 John Wiley & Sons, Ltd.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tax Harmonization versus Tax Competition in Europe: A Game Theoretical Approach

The purpose of this paper is to use a game theoretical approach to analyze tax harmonization, or competition, in a monetary union, more specifically in Europe. Without harmonization, free-riding behaviors may appear, leading to a sub-optimal tax equilibrium. Tax competition may also create budgetary problems and the objective of a balanced budget may not be attained. But national tax autonomy h...

متن کامل

Humans display a reduced set of consistent behavioral phenotypes in dyadic games

Socially relevant situations that involve strategic interactions are widespread among animals and humans alike. To study these situations, theoretical and experimental research has adopted a game theoretical perspective, generating valuable insights about human behavior. However, most of the results reported so far have been obtained from a population perspective and considered one specific con...

متن کامل

Usable Firewall Configuration

Configuration is perhaps the most important aspect of a firewall. It is often hard to fully understand the implications of a given configuration, giving rise to two problems: it is hard to write rules to enforce the expected security policy correctly, and it is hard to understand a set of rules to make necessary changes. In this paper, we briefly introduced the IP packet filtering firewall foll...

متن کامل

Changes in a Service Oriented Enterprise: A Game Theory Approach

Service Oriented Enterprises (SOEs) are subject to constant change and variation. In this paper, the changes are considered from an economic perspective based on service culture notion. Once a change is implemented, the costs of some member services may increase, whereas the costs of some other services may reduce. We construct a game theoretic model trying to capture the possible conflicting i...

متن کامل

Optimization of Firewall Filtering Rules by a Thorough Rewriting

The management of firewalls in today’s enterprise network environment is a complex and error-prone task. Effective techniques and tools for administrating the firewall configurations should be available to network administrators. In this paper, we present such a technique by using the geometry technology to model the firewall configurations. Each filtering rule is mapped onto a hyperspace objec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2012