Bonfring International Journal of Software Engineering and Soft Computing

Impact Factor: 0.375 | International Scientific Indexing(ISI) calculate based on International Citation Report(ICR)


Traffic Aware Privacy Preserving Firewall Policies in VPNs using Top-N Rules

Simi Mathew and J. Bhavithra


Abstract:

A Virtual Private Network is a widely deployed Network which allows roaming users to access resources from his organization?s network. In order to access the organization network?s resources an encrypted VPN tunnel is formed between home network and foreign network. Although it is useful for the roaming users it imposes security threats to the remote network because the remote network does not know what kind of data is flowing inside the encrypted tunnel. Throughout this paper an example of IBM as home network and MSU (Michigan State University) as foreign network is taken.Inorder to address this issue an Xhash protocol is used to compare the numbers of both parties without disclosing the number to each other. Then we use a firewall framework called VGuard that uses Xhash as the building block. A top-N firewall approximation algorithm is used for selecting the top-N most frequently matched subset of rules from the original ruleset. The goal is to obtain Top-N rules that cover as much traffic as possible while preserving the dependency relationships. The Top-N list is constructed by choosing the N rules with highest hit-rates followed by reordering them in descending order of priority. Then using the selected sub rule-set bootstrapping and filtering protocol is implemented.

Keywords: Virtual Private Networks, Privacy, Network Security, Firewall Approximation

Volume: 2 | Issue: Special Issue on Communication Technology Interventions for Rural and Social Development

Pages: 16-21

Issue Date: February , 2012

Email

Password

 


This Journal is an Open Access Journal to Facilitate the Research Community