Hybrid mechanism towards network packet early acceptance and rejection for unified threat management

Recent network architectures utilise many types of security appliances to combat blended attacks. However, managing multiple separate security appliances can be overwhelming, inefficient and expensive. Thus, multiple security features are needed to be integrated into unified security architecture re...

Full description

Saved in:
Bibliographic Details
Published inIET information security Vol. 11; no. 2; pp. 104 - 113
Main Authors Trabelsi, Zouheir, Zeidan, Safaa, Masud, Mohammad M
Format Journal Article
LanguageEnglish
Published The Institution of Engineering and Technology 01.03.2017
Subjects
Online AccessGet full text
ISSN1751-8709
1751-8717
DOI10.1049/iet-ifs.2015.0246

Cover

More Information
Summary:Recent network architectures utilise many types of security appliances to combat blended attacks. However, managing multiple separate security appliances can be overwhelming, inefficient and expensive. Thus, multiple security features are needed to be integrated into unified security architecture resulting in an unified threat management system (UTM). In most current UTM systems, whenever a security feature is needed, the corresponding module is just ‘attached or added on’. This approach of adding on may reduce the UTM performance dramatically, especially when security features such as IDS/IPS are enabled. In this study, a hybrid mechanism is proposed to solve UTM redundant packet classification problem. The mechanism is based on the use of splay tree filters and pattern-matching algorithms to enhance packet filtering and deep packet inspection (DPI) performance. The proposed mechanism uses network traffic statistics to dynamically optimise the order of the splay tree filters, allowing early acceptance and rejection of network packets. In addition, DPI signature rules are reordered according to their matching frequencies, allowing early packets acceptance. The authors demonstrate the merit of their mechanism through simulations performed on firewall and snort as independent packet manipulation systems compared with the proposed hybrid mechanism that uses unified communication between them.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1751-8709
1751-8717
DOI:10.1049/iet-ifs.2015.0246