Resiliency of open-source firewalls against remote discovery of last-matching rules

  • Authors:
  • Khaled Salah;Karim Sattar;Zubair Baig;Mohammed Sqalli;Prasad Calyam

  • Affiliations:
  • King Fahd University of Petroleum and Engineering, Dhahran, Saudi Arabia;King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia;King Fahd University of Petroleum and Engineering, Dhahran, Saudi Arabia;King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia;The Ohio State University, Columbus, OH, USA

  • Venue:
  • Proceedings of the 2nd international conference on Security of information and networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In today's networks, firewalls act as the first line of defense against unwanted and malicious traffics. Firewalls themselves can become targets of DoS attacks, thus jeopardizing their primary operation to filter traffic. Typically, packets are checked against a firewall policy consisting (in many cases) of thousands of rules. Last-matching rules are located at the bottom of the ruleset and consume the most CPU processing power of firewalls. If these rules get discovered by an attacker, the attacker can effectively launch a low-rate DoS attack that can bring the firewall to its knees. In prior work [1], we proposed and evaluated a technique to remotely discover the last matching rules of the Linux Netfilter firewall. In this paper, we examine the effectiveness of such technique on the discovery of last-matching rules in two other popular open-source network firewalls, namely Linux IPSets and FreeBSD ipfw.