Lionel Saliou
Scenario Analysis using Out-of-line Firewall Evaluation Framework.
Saliou, Lionel; Buchanan, William J; Graves, Jamie; Munoz, Jose
Abstract
Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These attacks typically aim at disabling computer network infrastructure, and, since there is no one method to mitigate this type of threat, organisations must deploy adequate solutions, and assess the adequacy of their choices against their network requirements, through analysis, such as a simulation, or through network device modelling. A key factor is that DDoS is a dynamic type of attack, and thus device performance is a key parameter, especially for intermediate devices, such as network firewalls. Most of the modelling, though, for firewalls is focusing on static and logical performance attributes, such as whether traffic is denied or permitted. Thus existing models typically cannot deal with dynamic issues when related to intermediate devices. Simulation tools might be possible, but it is often difficult to cover a whole range of devices, thus this paper outlines a novel method of modelling the dynamic performance of network firewalls, and in measuring if they can cope with varying network loads.
Citation
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall Evaluation Framework.
Conference Name | 6th European Conference on Information Warfare, and Security |
---|---|
Conference Location | Shrivenham, UK |
Start Date | Jul 2, 2007 |
End Date | Jul 3, 2007 |
Publication Date | Jul 2, 2007 |
Deposit Date | May 20, 2009 |
Publicly Available Date | May 20, 2009 |
Peer Reviewed | Peer Reviewed |
Pages | 205-214 |
Keywords | Network security; Distributed denial of service; Dynamic attack; Network firewalls; Dynamic performance evaluation; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/2602 |
Files
L_Saliou_2007_ECIW-S_FW_Scenario_Analysis_revised.pdf
(<nobr>305 Kb</nobr>)
PDF
You might also like
A framework for live host-based Bitcoin wallet forensics and triage
(2022)
Journal Article
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
(2022)
Journal Article
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
(2022)
Journal Article
Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates
(2022)
Conference Proceeding