<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">Discrete and Continuous Models and Applied Computational Science</journal-id><journal-title-group><journal-title xml:lang="en">Discrete and Continuous Models and Applied Computational Science</journal-title><trans-title-group xml:lang="ru"><trans-title>Discrete and Continuous Models and Applied Computational Science</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2658-4670</issn><issn publication-format="electronic">2658-7149</issn><publisher><publisher-name xml:lang="en">Peoples' Friendship University of Russia named after Patrice Lumumba (RUDN University)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">27527</article-id><article-id pub-id-type="doi">10.22363/2658-4670-2021-29-3-230-241</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>Articles</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>Статьи</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">Evaluation of firewall performance when ranging a filtration rule set</article-title><trans-title-group xml:lang="ru"><trans-title>Оценка производительности межсетевого экрана при ранжировании набора правил фильтрации</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-1412-981X</contrib-id><name-alternatives><name xml:lang="en"><surname>Botvinko</surname><given-names>Anatoly Y.</given-names></name><name xml:lang="ru"><surname>Ботвинко</surname><given-names>А. Ю.</given-names></name></name-alternatives><bio xml:lang="en"><p>postgraduate of Department of Applied Probability and Informatics</p></bio><email>botviay@sci.pfu.edu.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6368-9680</contrib-id><name-alternatives><name xml:lang="en"><surname>Samouylov</surname><given-names>Konstantin E.</given-names></name><name xml:lang="ru"><surname>Самуйлов</surname><given-names>К. Е.</given-names></name></name-alternatives><bio xml:lang="en"><p>Doctor of Technical Sciences, Professor, Head of Department of Applied Probability and Informatics</p></bio><email>samuylov-ke@rudn.ru</email><xref ref-type="aff" rid="aff1"/><xref ref-type="aff" rid="aff2"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">Peoples’ Friendship University of Russia (RUDN University)</institution></aff><aff><institution xml:lang="ru">Российский университет дружбы народов</institution></aff></aff-alternatives><aff-alternatives id="aff2"><aff><institution xml:lang="en">Research Center “Computer Science and Control” of the Russian Academy of Sciences</institution></aff><aff><institution xml:lang="ru">Федеральный исследовательский центр «Информатика и управление» РАН</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2021-09-30" publication-format="electronic"><day>30</day><month>09</month><year>2021</year></pub-date><volume>29</volume><issue>3</issue><issue-title xml:lang="en">VOL 29, NO3 (2021)</issue-title><issue-title xml:lang="ru">ТОМ 29, №3 (2021)</issue-title><fpage>230</fpage><lpage>241</lpage><history><date date-type="received" iso-8601-date="2021-09-30"><day>30</day><month>09</month><year>2021</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2021, Botvinko A.Y., Samouylov K.E.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2021, Ботвинко А.Ю., Самуйлов К.Е.</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="en">Botvinko A.Y., Samouylov K.E.</copyright-holder><copyright-holder xml:lang="ru">Ботвинко А.Ю., Самуйлов К.Е.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">http://creativecommons.org/licenses/by/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/miph/article/view/27527">https://journals.rudn.ru/miph/article/view/27527</self-uri><abstract xml:lang="en"><p style="text-align: justify;">This article is a continuation of a number of works devoted to evaluation of probabilistic-temporal characteristics of firewalls when ranging a filtration rule set. This work considers a problem of the decrease in the information flow filtering efficiency. The problem emerged due to the use of a sequential scheme for checking the compliance of packets with the rules, as well as due to heterogeneity and variability of network traffic. The order of rules is non-optimal, and this, in the high-dimensional list, significantly influences the firewall performance and also may cause a considerable time delay and variation in values of packet service time, which is essentially important for the stable functioning of multimedia protocols. One of the ways to prevent decrease in the performance is to range a rule set according to the characteristics of the incoming information flows. In this work, the problems to be solved are: determination and analysis of an average filtering time for the traffic of main transmitting networks; and assessing the effectiveness of ranging the rules. A method for ranging a filtration rule set is proposed, and a queuing system with a complex request service discipline is built. A certain order is used to describe how requests are processed in the system. This order includes the execution of operations with incoming packets and the logical structure of filtration rule set. These are the elements of information flow processing in the firewall. Such level of detailing is not complete, but it is sufficient for creating a model. The QS characteristics are obtained with the help of simulation modelling methods in the Simulink environment of the matrix computing system MATLAB. Based on the analysis of the results obtained, we made conclusions about the possibility of increasing the firewall performance by ranging the filtration rules for those traffic scripts that are close to real ones.</p></abstract><trans-abstract xml:lang="ru"><p style="text-align: justify;">Данная статья является продолжением ряда работ, посвящённых оценке вероятностно-временных характеристик межсетевых экранов при ранжировании набора правил фильтрации. В публикации рассматривается проблема снижения эффективности фильтрации информационных потоков. Проблема возникла из-за использования последовательной схемы проверки соответствия пакетов правилам, а также из-за неоднородности и изменчивости сетевого трафика. Порядок правил неоптимален, и это в многомерном списке существенно влияет на производительность межсетевого экрана, а также может вызывать значительную временную задержку и вариации в значениях времени обслуживания пакетов, что существенно важно для стабильной работы мультимедийных протоколов. Один из способов предотвратить снижение производительности - это ранжировать набор правил в соответствии с характеристиками входящих информационных потоков. В исследовании решаются следующие задачи: определение и анализ среднего времени фильтрации трафика основных передающих сетей; оценка эффективности ранжирования правил. Предложен метод ранжирования набора правил фильтрации и построена система массового обслуживания со сложной дисциплиной обслуживания запросов. Определённый порядок используется для описания того, как запросы обрабатываются в системе, и включает в себя выполнение операций с входящими пакетами и логическую структуру набора правил фильтрации. Таковы элементы обработки информационного потока в межсетевом экране. Подобный уровень детализации не полный, но его достаточно для создания модели. Характеристики СМО получены с помощью методов имитационного моделирования в среде Simulink матричной вычислительной системы MATLAB. На основании анализа полученных результатов были сделаны выводы о возможности повышения производительности межсетевого экрана за счёт ранжирования правил фильтрации для тех скриптов трафика, которые близки к реальным.</p></trans-abstract><kwd-group xml:lang="en"><kwd>firewall</kwd><kwd>ranging the filtration rules</kwd><kwd>network traffic</kwd><kwd>phase service</kwd><kwd>simulation model</kwd><kwd>queuing system</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>межсетевой экран</kwd><kwd>ранжирование правил фильтрации</kwd><kwd>сетевой трафик</kwd><kwd>фазовое обслуживание</kwd><kwd>имитационная модель</kwd><kwd>система массового обслуживания</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><mixed-citation>S. V. Lebed, Firewall protection. Theory and practice of external perimeter protection [Mezhsetevoye ekranirovaniye. Teoriya i praktika zashchity vneshnego perimetra]. Moscow: BMSTU, Bauman Moscow State Technical University Publ., 2002, p. 304, in Russian.</mixed-citation></ref><ref id="B2"><label>2.</label><mixed-citation>O. R. Laponina, The foundation of network security [Osnovy setevoy bezopasnosti]. Moscow: Publishing house of the national Open University «INTUIT», 2014, p. 377, in Russian.</mixed-citation></ref><ref id="B3"><label>3.</label><mixed-citation>K. V. Ivanov and P. I. Tutubalin, Markov models of protection of automated control systems for special purposes [Markovskie modeli zashhity’ avtomatizirovanny’x sistem upravleniya special’nogo naznacheniya]. Kazan: Publishing house of GBU Republican center for monitoring the quality of education Publ., 2012, p. 216, in Russian.</mixed-citation></ref><ref id="B4"><label>4.</label><mixed-citation>“Governing document. Computer aids. Firewall. Protection against unauthorized access to information. Indicators of security against unauthorized access to information [Rukovodyashhij dokument. Sredstva vy’chislitel’noj texniki. Mezhsetevy’e e’krany’. Zashhita ot nesankcionirovannogo dostupa k informacii. Pokazateli zashhishhennosti ot nesankcionirovannogo dostupa k informacii] approved by the decision of the Chairman of the State Technical Commission under the President of the Russian Federation dated July 25, 1997,” in Russian.</mixed-citation></ref><ref id="B5"><label>5.</label><mixed-citation>H. Hamed, A. El-Atawy, and E. Al-Shaer, “On dynamic optimization of packet matching in high-speed firewalls,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 10, pp. 1817-1830, 2006. DOI: 10.1109/JSAC.2006.877140.</mixed-citation></ref><ref id="B6"><label>6.</label><mixed-citation>R. Mohan, A. Yazidi, B. Feng, and J. Oommen, “On optimizing firewall performance in dynamic networks by invoking a novel swapping windowbased paradigm,” International Journal of Communication Systems, vol. 31, no. 15, e3773, 2018. DOI: 10.1002/dac.3773.</mixed-citation></ref><ref id="B7"><label>7.</label><mixed-citation>E. Al Shaer, Automated firewall analytics: Design, configuration and optimization. Springer International Publishing, 2014, p. 132. DOI: 10.1007/978-3-319-10371-6.</mixed-citation></ref><ref id="B8"><label>8.</label><mixed-citation>R. Mohan, A. Yazidi, B. Feng, and B. J. Oommen, “Dynamic ordering of firewall rules using a novel swapping window-based paradigm,” in Proceedings 6th International Conference on Communication and Network, ICCNS 2016, Singapore: ACM Proceedings, 2016, pp. 11-20. DOI: 10.1145/3017971.3017975.</mixed-citation></ref><ref id="B9"><label>9.</label><mixed-citation>Z. Trabelsi, S. Zeidan, M. M. Masud, and K. Ghoudi, “Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement,” Computers &amp; Security, vol. 53, pp. 109-131, 2015. DOI: 10.1016/j.cose.2015.05.010.</mixed-citation></ref><ref id="B10"><label>10.</label><mixed-citation>K. Salah, K. Elbadawi, and R. Boutaba, “Performance modeling and analysis of network firewalls,” IEEE Transactions on Network and Service Management, vol. 9, no. 1, pp. 12-21, 2012. DOI: 10.1109/TNSM.2011. 122011.110151.</mixed-citation></ref><ref id="B11"><label>11.</label><mixed-citation>C. Diekmann, L. Hupel, J. Michaelis, M. Haslbeck, and G. Carle, “Verified iptables firewall analysis and verification,” Journal of Automated Reasoning, vol. 61, no. 1-4, pp. 191-242, 2018. DOI: 10.1007/s10817017-9445-1.</mixed-citation></ref><ref id="B12"><label>12.</label><mixed-citation>S. Khummanee, “The semantics loss tracker of firewall rules,” Advances in Intelligent Systems and Computing, vol. 769, pp. 220-231, 2018. DOI: 10.1007/978-3-319-93692-5_22.</mixed-citation></ref><ref id="B13"><label>13.</label><mixed-citation>V. Clincy and H. Shahriar, “Detection of anomaly in firewall rule-sets,” Advances in Intelligent Systems and Computing, vol. 842, pp. 422-431, 2018. DOI: 10.1007/978-3-319-98776-7_46.</mixed-citation></ref><ref id="B14"><label>14.</label><mixed-citation>P. P. Bocharov and A. V. Pechenkin, Queuing theory [Teoriya massovogo obsluzhivaniya]. Moscow: Publishing RUDN, 1995, p. 529, in Russian.</mixed-citation></ref><ref id="B15"><label>15.</label><mixed-citation>V. Y. Katkovnik, Non-parametric data identification and smoothing: local approximation method [Neparametricheskaya identifikatsiya i sglazhivaniye dannykh: metod lokal’noy approksimatsii]. Moscow: The science. Main editorial office of physical and mathematical literature Publ., 1985, in Russian.</mixed-citation></ref><ref id="B16"><label>16.</label><mixed-citation>J. M. Bravo, T. Alamo, M. Vasallo, and M. E. Gegúndez, “A general framework for predictors based on bounding techniques and local approximation,” IEEE Transactions on Automatic Control, vol. 62, no. 7, pp. 3430-3435, 2017. DOI: 10.1109/TAC.2016.2612538.</mixed-citation></ref><ref id="B17"><label>17.</label><mixed-citation>H. Al-Shuka, “On local approximation-based adaptive control with applications to robotic manipulators and biped robots,” International Journal of Dynamics and Control, vol. 6, no. 1, pp. 339-353, 2018. DOI: 10.1007/s40435-016-0302-6.</mixed-citation></ref><ref id="B18"><label>18.</label><mixed-citation>D. E. Plotnikov, T. S. Miklashevich, and S. A. Bartalev, “Using local polynomial approximation within moving window for remote sensing data time-series smoothing and data gaps recovery [Vosstanovleniye vremennykh ryadov dannykh distantsionnykh izmereniy metodom polinomialnoy approksimatsii v skolzyashchem okne peremennogo razmera],” Modern problems of remote sensing of the Earth from space of the Russian Academy of Sciences, vol. 11, no. 2, pp. 103-110, 2014, in Russian.</mixed-citation></ref><ref id="B19"><label>19.</label><mixed-citation>D. R. Cox, “A use of complex probabilities in the theory of stochastic processes,” Mathematical Proceedings of the Cambridge Philosophical Society, vol. 51, no. 2, pp. 313-319, 1955. DOI: 10.1017/S0305004100030231.</mixed-citation></ref><ref id="B20"><label>20.</label><mixed-citation>A. Y. Botvinko and K. E. Samouylov, “Adaptive ranking of the firewall rule set using local approximation [Adaptivnoye ranzhirovaniye nabora pravil mezhsetevogo ekrana metodom lokal’noy approksimatsii],” in Distributed Computer and Communication Networks: Control, Computation, Communications, in Russian, 2018, pp. 334-341.</mixed-citation></ref></ref-list></back></article>
