{"id":"https://openalex.org/W2104914168","doi":"https://doi.org/10.1145/1128817.1128867","title":"Dynamic rule-ordering optimization for high-speed firewall filtering","display_name":"Dynamic rule-ordering optimization for high-speed firewall filtering","publication_year":2006,"publication_date":"2006-03-21","ids":{"openalex":"https://openalex.org/W2104914168","doi":"https://doi.org/10.1145/1128817.1128867","mag":"2104914168"},"language":"en","primary_location":{"id":"doi:10.1145/1128817.1128867","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111935193","display_name":"H. Hamed","orcid":null},"institutions":[{"id":"https://openalex.org/I118353179","display_name":"DePaul University","ror":"https://ror.org/04xtx5t16","country_code":"US","type":"education","lineage":["https://openalex.org/I118353179"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hazem Hamed","raw_affiliation_strings":["DePaul University, Chicago, Illinois","DePaul University, Chicago, Illinois#TAB#"],"affiliations":[{"raw_affiliation_string":"DePaul University, Chicago, Illinois","institution_ids":["https://openalex.org/I118353179"]},{"raw_affiliation_string":"DePaul University, Chicago, Illinois#TAB#","institution_ids":["https://openalex.org/I118353179"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043893479","display_name":"Ehab Al\u2010Shaer","orcid":"https://orcid.org/0000-0002-7665-8293"},"institutions":[{"id":"https://openalex.org/I118353179","display_name":"DePaul University","ror":"https://ror.org/04xtx5t16","country_code":"US","type":"education","lineage":["https://openalex.org/I118353179"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ehab Al-Shaer","raw_affiliation_strings":["DePaul University, Chicago, Illinois","DePaul University, Chicago, Illinois#TAB#"],"affiliations":[{"raw_affiliation_string":"DePaul University, Chicago, Illinois","institution_ids":["https://openalex.org/I118353179"]},{"raw_affiliation_string":"DePaul University, Chicago, Illinois#TAB#","institution_ids":["https://openalex.org/I118353179"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111935193"],"corresponding_institution_ids":["https://openalex.org/I118353179"],"apc_list":null,"apc_paid":null,"fwci":7.0952,"has_fulltext":false,"cited_by_count":104,"citation_normalized_percentile":{"value":0.97477881,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"332","last_page":"342"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.84739089012146},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8037054538726807},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.681641697883606},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6687824726104736},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.5939607620239258},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4923630952835083},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4703364968299866},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.45243293046951294},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44233348965644836},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36687320470809937},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.15519797801971436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09397664666175842}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.84739089012146},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8037054538726807},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.681641697883606},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6687824726104736},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.5939607620239258},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4923630952835083},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4703364968299866},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.45243293046951294},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44233348965644836},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36687320470809937},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.15519797801971436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09397664666175842},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1128817.1128867","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.94.5841","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.5841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.mnlab.cs.depaul.edu/mnlab/pubs/asiaccs06.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1367232","https://openalex.org/W79029001","https://openalex.org/W1496979250","https://openalex.org/W1569458199","https://openalex.org/W1576191218","https://openalex.org/W1762430620","https://openalex.org/W1960330418","https://openalex.org/W1983051954","https://openalex.org/W1993449345","https://openalex.org/W2016153661","https://openalex.org/W2022106793","https://openalex.org/W2042448840","https://openalex.org/W2076516498","https://openalex.org/W2079656678","https://openalex.org/W2094051614","https://openalex.org/W2098580177","https://openalex.org/W2112208179","https://openalex.org/W2115278163","https://openalex.org/W2131999424","https://openalex.org/W2137145600","https://openalex.org/W2137231558","https://openalex.org/W2150446509","https://openalex.org/W2168626603","https://openalex.org/W2169553922","https://openalex.org/W3017037959","https://openalex.org/W3142489993"],"related_works":["https://openalex.org/W2365857366","https://openalex.org/W8359669","https://openalex.org/W40377838","https://openalex.org/W2380723950","https://openalex.org/W2274587657","https://openalex.org/W2009238965","https://openalex.org/W2296501187","https://openalex.org/W2361515550","https://openalex.org/W2937538064","https://openalex.org/W2583381754"],"abstract_inverted_index":{"Packet":[0],"filtering":[1,34,43,50,107,147,169],"plays":[2],"a":[3,136],"critical":[4],"role":[5],"in":[6,60,68,110,174,188,215],"many":[7],"of":[8,23,48,105,112,167],"the":[9,46,49,57,75,89,103,155,165,203],"current":[10],"high":[11,31,37,70],"speed":[12,38],"network":[13,39],"technologies":[14],"such":[15],"as":[16,177,179],"firewalls":[17],"and":[18,121,128,198,211],"IPSec":[19],"devices.":[20],"The":[21,149,171],"optimization":[22,190],"firewall":[24,146,217],"policies":[25],"is":[26,206],"critically":[27],"important":[28],"to":[29,117,125,144,154,162,208,213],"provide":[30],"performance":[32,76],"packet":[33,42,106,168],"particularly":[35],"for":[36,88],"security.":[40],"Current":[41],"techniques":[44,84,114],"exploit":[45],"characteristics":[47,143],"policies,":[51],"but":[52],"they":[53],"do":[54],"not":[55,99],"consider":[56],"traffic":[58,142,156,175,201],"behavior":[59],"optimizing":[61],"their":[62],"search":[63,92],"data":[64],"structures.":[65],"This":[66],"results":[67],"impractically":[69],"space":[71],"complexity,":[72],"which":[73],"undermines":[74],"gain":[77],"offered":[78],"by":[79],"these":[80,83,113],"techniques.":[81],"Also,":[82],"offer":[85],"upper":[86],"bounds":[87],"worst":[90],"case":[91,96],"times;":[93],"nevertheless,":[94],"average":[95],"scenarios":[97],"are":[98,115,185],"necessarily":[100],"optimized.":[101],"Moreover,":[102],"types":[104],"fields":[108,120],"used":[109],"most":[111],"limited":[116],"IP":[118],"header":[119],"cannot":[122],"be":[123,209],"generalized":[124],"cover":[126],"transport":[127],"application":[129],"layer":[130],"filtering.In":[131],"this":[132],"paper,":[133],"we":[134],"present":[135],"novel":[137],"technique":[138,151],"that":[139],"utilizes":[140],"Internet":[141,200],"optimize":[145,164],"policies.":[148],"proposed":[150,204],"timely":[152],"adapts":[153],"conditions":[157],"using":[158,196],"actively":[159],"calculated":[160],"statistics":[161],"dynamically":[163],"ordering":[166],"rules.":[170],"rule":[172],"importance":[173],"matching":[176],"well":[178],"its":[180],"dependency":[181],"on":[182],"other":[183],"rules":[184],"both":[186],"considered":[187],"our":[189],"algorithm.":[191],"Through":[192],"extensive":[193],"evaluation":[194],"experiments":[195],"simulated":[197],"real":[199],"traces,":[202],"mechanism":[205],"shown":[207],"efficient":[210],"easy":[212],"deploy":[214],"practical":[216],"implementations.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
