
Firewall Design and Analysis
by Liu, Alex X.-
eCampus.com Device Compatibility Matrix
Click the device icon to install or view instructions
Rent Textbook
Rent Digital
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
Preface | p. vii |
Prologue | p. 1 |
Background and Motivation | p. 1 |
Previous Work | p. 3 |
Previous Work on Firewall Design | p. 3 |
Previous Work on Firewall Analysis | p. 4 |
Contributions of the Book | p. 5 |
Structured Firewall Design | p. 5 |
Diverse Firewall Design | p. 6 |
Stateful Firewall Model | p. 6 |
Firewall Queries | p. 7 |
Firewall Redundancy Detection | p. 8 |
Overview of the Book | p. 8 |
Structured Firewall Design | p. 9 |
Motivation | p. 9 |
Consistency, Completeness and Compactness | p. 9 |
Structured Firewall Design | p. 12 |
Firewall Decision Diagrams | p. 13 |
FDD Reduction | p. 17 |
FDD Marking | p. 18 |
Firewall Generation | p. 21 |
Firewall Compaction | p. 23 |
Firewall Simplification | p. 26 |
Summary of Structured Firewall Design | p. 28 |
Diverse Firewall Design | p. 31 |
Construction Algorithm | p. 35 |
Shaping Algorithm | p. 37 |
FDD Simplifying | p. 39 |
Node Shaping | p. 39 |
FDD Shaping | p. 43 |
Comparison Algorithm | p. 44 |
Experimental Results | p. 45 |
Stateful Firewall Model | p. 49 |
Firewall Model | p. 51 |
Firewall Examples | p. 56 |
Example I: Tracking Outgoing Packets | p. 56 |
Example II: Tracking FTP Ptotocol | p. 57 |
Removing Packets from Firewall State | p. 60 |
Firewall States | p. 62 |
Truly Stateful and Truly Stateless Firewalls | p. 63 |
Stateless Derivatives | p. 64 |
Firewall Properties | p. 65 |
Conforming Firewalls | p. 65 |
Proper Firewalls | p. 66 |
Firewall Queries | p. 69 |
Structured Firewall Query Language | p. 72 |
Firewalls | p. 72 |
Query Language | p. 73 |
Firewall Query Examples | p. 74 |
Firewall Query Processing | p. 77 |
FDT-based Firewall Query Processing Algorithm | p. 79 |
Experimental Results | p. 80 |
Firewall Redundancy Detection | p. 83 |
Firewall Redundant Rules | p. 86 |
Removing Upward Redundancy | p. 88 |
Removing Downward Redundancy | p. 94 |
Experimental Results | p. 98 |
Epilogue | p. 101 |
Conclusions | p. 101 |
Acknowledgments | p. 103 |
Bibliography | p. 105 |
Index | p. 109 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.