Fall 2025 theses and dissertations (non-restricted) will be available in ERA on November 17, 2025.

RuleAnalyzer

dc.contributor.authorHayer, Amarpreet
dc.date.accessioned2025-05-01T01:52:43Z
dc.date.available2025-05-01T01:52:43Z
dc.date.issued2008-03-19
dc.descriptionFirewalls and IDS (Intrusion Detection Systems) use packet classification for filtering incoming and outgoing packets. Traffic isolation through packet classification is important for devices like routers and firewalls that provide services like admission control, per-flow queuing and quality of service. These devices use a combination of algorithms and rules to classify packets and take appropriate action(s) which are defined based on access control lists. Most devices work well with smaller access control lists and lower data rates, but with most organizations demanding remote services and performance, this leads to complex networks with huge access lists and higher bandwidth. At the time of writing this report devices are able to push data rates of 10 Gig/sec. Higher data rates combined with large access control lists shrink the time devices have to inspect packets, hence leading to the problem of unclassified packets either being denied access or permit to enter organizational networks. Either case is not desirable as first leads to performance degradation and later leaves internal networks vulnerable to potential attacks. (As cited in abstract.)
dc.identifier.doihttps://doi.org/10.7939/r3-73t7-p087
dc.language.isoen
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/
dc.subjectPacket classification
dc.titleRuleAnalyzer
dc.typehttp://purl.org/coar/resource_type/c_93fc
ual.jupiterAccesshttp://terms.library.ualberta.ca/public

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Hayer.pdf
Size:
514.71 KB
Format:
Adobe Portable Document Format