首页 | 本学科首页   官方微博 | 高级检索  
     


Application of evolutionary algorithm in performance optimization of embedded network firewall
Affiliation:1. School of Computer Science and Information Engineering, Anyang Institute of Technology, Henan, Anyang 455000, China;2. School of Management, Xinxiang Medical University, Henan, Xinxiang 453003, China;1. Research Scholar, Faculty of ICE, Anna University, India;2. Professor and Dean Mechanical Engineering KIT, Coimbatore, 641402, India;3. Associate professor and Electrical and Electronics Engineering ESEC, Erode, 638057, India;1. Department for Resilience of Maritime Systems, German Aerospace Center, Bremerhaven, Germany;2. Universidade Federal de Viçosa, Brazil;3. Group of Computer Architecture, University of Bremen, Germany;4. Universidade Federal de Minas Gerais, Brazil;5. Centro Federal de Educação Tecnológica de Minas Gerais, Brazil;6. Johannes Kepler University Linz, Austria;7. Cyber-Physical Systems, DFKI GmbH, Bremen, Germany;1. Department of Computer Science, Bharathidasan University, Trichy, India;2. Department of Computer Science, Bharathidasan University, Trichy, India;3. Department of Computer Science and Engineering, Nehru Institute of Engineering and Technology, Coimbatore, India;4. Department of Electronics and Communication Engineering, Sri Ramanujar Engineering College, Chennai- 600127, Tamil Nadu, India
Abstract:With the development of the network, the problem of network security is becoming increasingly serious. The importance of a firewall as the "first portal" to network security is obvious. In order to cope with a complex network environment, the firewall must formulate a large number of targeted rules to help it implement network security policies. Based on the characteristics of the cloud environment, this paper makes in-depth research on network security protection technology, and studies the network firewall system. The system implements unified configuration of firewall policy rules on the cloud management end and delivers them to the physical server where the virtual machine is located. Aiming at the characteristics of virtual machines sharing network resources through kernel bridges, a network threat model for virtual machines in a cloud environment is proposed. Through analysis of network security threats, a packet filtering firewall scheme based on kernel bridges is determined. Various conflict relationships between rules are defined, and a conflict detection algorithm is designed. Based on this, a rule order adjustment algorithm that does not destroy the original semantics of the rule table is proposed. Starting from the matching probability of the rules, simple rules are separated from the default rules according to the firewall logs, the relationships between these rules and the original rules are analyzed, and the rules are merged into new rules to evaluate the impact of these rules on the performance of the firewall. New rules are added to the firewall rule base to achieve linear firewall optimization. It can be seen from the experimental results that the optimization strategy proposed in this paper can effectively reduce the average number of matching rules and improve the performance of the firewall.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号