{"id":"https://openalex.org/W2990965385","doi":"https://doi.org/10.23919/softcom.2019.8903718","title":"Optimization of Parallel Firewalls Filtering Rules","display_name":"Optimization of Parallel Firewalls Filtering Rules","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2990965385","doi":"https://doi.org/10.23919/softcom.2019.8903718","mag":"2990965385"},"language":"en","primary_location":{"id":"doi:10.23919/softcom.2019.8903718","is_oa":false,"landing_page_url":"https://doi.org/10.23919/softcom.2019.8903718","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014687233","display_name":"Taha Elamine Hadjadj","orcid":"https://orcid.org/0000-0001-6868-4881"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Taha Elamine Hadjadj","raw_affiliation_strings":["Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage,Tunisia","Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage,Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071944111","display_name":"Rim Tebourbi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088638","display_name":"Higher Institute of Management","ror":"https://ror.org/003sxhp42","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210088638"]},{"id":"https://openalex.org/I4210099641","display_name":"Higher Institute of Food Industries of Tunis","ror":"https://ror.org/011bq0640","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210099641"]}],"countries":["RU","TN"],"is_corresponding":false,"raw_author_name":"Rim Tebourbi","raw_affiliation_strings":["Higher School of Communication of Tunis,Tunisia","Higher School of Communication of Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher School of Communication of Tunis,Tunisia","institution_ids":["https://openalex.org/I4210088638","https://openalex.org/I4210099641"]},{"raw_affiliation_string":"Higher School of Communication of Tunis, Tunisia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075259756","display_name":"Adel Bouhoula","orcid":"https://orcid.org/0000-0003-2920-2338"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Adel Bouhoula","raw_affiliation_strings":["Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage,Tunisia","Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage,Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006211488","display_name":"Riadh Ksantini","orcid":"https://orcid.org/0000-0001-8143-1600"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Riadh Ksantini","raw_affiliation_strings":["Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage,Tunisia","Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage,Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014687233"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":0.7223,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69814767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.9166743755340576},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8794643878936768},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.8669345378875732},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8370217680931091},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6708866953849792},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6693398952484131},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5870729684829712},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5422637462615967},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5299920439720154},{"id":"https://openalex.org/keywords/context-based-access-control","display_name":"Context-based access control","score":0.47372499108314514},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4399094879627228},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15610793232917786},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.08301818370819092}],"concepts":[{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.9166743755340576},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8794643878936768},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.8669345378875732},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8370217680931091},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6708866953849792},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6693398952484131},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5870729684829712},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5422637462615967},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5299920439720154},{"id":"https://openalex.org/C42934231","wikidata":"https://www.wikidata.org/wiki/Q1128692","display_name":"Context-based access control","level":5,"score":0.47372499108314514},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4399094879627228},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15610793232917786},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.08301818370819092},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/softcom.2019.8903718","is_oa":false,"landing_page_url":"https://doi.org/10.23919/softcom.2019.8903718","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W46972015","https://openalex.org/W1999723039","https://openalex.org/W2034114460","https://openalex.org/W2106393787","https://openalex.org/W2148408186","https://openalex.org/W2150740451","https://openalex.org/W2170704207","https://openalex.org/W2769007064","https://openalex.org/W2884096875","https://openalex.org/W2886042450","https://openalex.org/W3135821462","https://openalex.org/W4256485853","https://openalex.org/W6601876108","https://openalex.org/W6650209347","https://openalex.org/W6791391762"],"related_works":["https://openalex.org/W2361515550","https://openalex.org/W2495628081","https://openalex.org/W2583381754","https://openalex.org/W4363647490","https://openalex.org/W2916429898","https://openalex.org/W2082371893","https://openalex.org/W2347324149","https://openalex.org/W2057573940","https://openalex.org/W8359669","https://openalex.org/W2365857366"],"abstract_inverted_index":{"As":[0],"filtering":[1,10],"policies":[2],"are":[3,21,50],"getting":[4],"larger":[5],"and":[6,26,42,87,120],"more":[7],"complex,":[8],"packet":[9],"at":[11],"firewalls":[12,57],"needs":[13],"to":[14,23,84,139,152],"keep":[15],"low":[16],"delays.":[17],"New":[18],"firewall":[19,67],"architectures":[20,36],"needed":[22],"enforce":[24],"security":[25,157],"meet":[27],"the":[28,47,60,64,72,81,91,105,113,118,121],"increasing":[29],"demand":[30],"for":[31,38,155],"high-speed":[32],"networks.":[33],"Two":[34],"main":[35],"exist":[37],"parallelization,":[39],"data":[40,119],"parallel":[41,44,100],"function":[43],"firewalls.":[45,92],"In":[46,63],"first,":[48],"packets":[49,82,135],"distributed":[51],"across":[52],"a":[53,69,75,96],"set":[54],"of":[55,71,78,107,115,134,143,147],"identical":[56],"that":[58,103],"implement":[59],"entire":[61],"policy.":[62],"second,":[65],"each":[66],"implements":[68],"subset":[70],"policy":[73],"with":[74,101],"fewer":[76],"number":[77],"rules,":[79],"but":[80],"have":[83],"be":[85,125,153],"duplicated":[86],"processed":[88],"by":[89],"all":[90],"This":[93],"paper":[94],"proposes":[95],"new":[97],"architecture":[98,111,130,149],"Function":[99],"preprocessing":[102],"combines":[104],"advantages":[106],"both.":[108],"The":[109,145],"proposed":[110],"has":[112],"advantage":[114],"not":[116],"duplicating":[117],"processing":[122],"time":[123],"can":[124],"significantly":[126],"reduced.":[127],"Moreover,":[128],"our":[129],"enables":[131],"stateful":[132],"inspection":[133],"which":[136],"is":[137],"necessary":[138],"prevent":[140],"multiple":[141],"types":[142],"attacks.":[144],"performances":[146],"this":[148],"were":[150],"proven":[151],"scalable":[154],"large":[156],"policies.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
