{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:37:29Z","timestamp":1742380649210,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10207-021-00557-4","type":"journal-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T06:02:35Z","timestamp":1624255355000},"page":"323-340","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Optimization of parallel firewalls filtering rules"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6868-4881","authenticated-orcid":false,"given":"Taha Elamine","family":"Hadjadj","sequence":"first","affiliation":[]},{"given":"Adel","family":"Bouhoula","sequence":"additional","affiliation":[]},{"given":"Rim","family":"Tebourbi","sequence":"additional","affiliation":[]},{"given":"Riadh","family":"Ksantini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"557_CR1","unstructured":"Carsten, B.:\u201cA parallel packet screen for high speed networks,\u201d in Proceedings 15th Annual Computer Security Applications Conference (ACSAC\u201999). IEEE, (1999), pp. 67\u201374"},{"issue":"1","key":"557_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.26599\/TST.2018.9010003","volume":"24","author":"Y Cheng","year":"2018","unstructured":"Cheng, Y., Wang, W., Wang, J., Wang, H.: Fpc: a new approach to firewall policies compression. Tsinghua Sci. Technol. 24(1), 65\u201376 (2018)","journal-title":"Tsinghua Sci. Technol."},{"key":"557_CR3","volume-title":"Parallel Computer Architecture: A Hardware\/Software approach","author":"D Culler","year":"1999","unstructured":"Culler, D., Singh, J.P., Gupta, A.: Parallel Computer Architecture: A Hardware\/Software approach. Gulf Professional Publishing, Houston (1999)"},{"key":"557_CR4","unstructured":"d\u2019Otreppe\u00a0de Bouvette, T.: Packetforge-ng. [Online]. Available: https:\/\/www.aircrack-ng.org\/doku.php?id=packetforge-ng"},{"key":"557_CR5","unstructured":"Farley, R.\u00a0J.: \u201cParallel firewall designs for high-speed networks,\u201d (2005)"},{"key":"557_CR6","doi-asserted-by":"crossref","unstructured":"Fulp, E.\u00a0W., Farley, R.\u00a0J.: \u201cA function-parallel architecture for high-speed firewalls,\u201d in 2006 IEEE International Conference on Communications, vol.\u00a05. IEEE, (2006), pp. 2213\u20132218","DOI":"10.1109\/ICC.2006.255099"},{"key":"557_CR7","unstructured":"Goddard, S., Kieckhafer, R., Zhang, Y.: \u201cAn unavailability analysis of firewall sandwich configurations,\u201d in Proceedings Sixth IEEE International Symposium on High Assurance Systems Engineering, pp. 139\u2013148. Impact of Networking. IEEE, Special Topic (2001)"},{"issue":"4","key":"557_CR8","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1016\/j.comnet.2006.06.015","volume":"51","author":"MG Gouda","year":"2007","unstructured":"Gouda, M.G., Liu, A.X.: Structured firewall design. Comput. Netw. 51(4), 1106\u20131120 (2007)","journal-title":"Comput. Netw."},{"key":"557_CR9","unstructured":"Grout, V., McGinn, J., Davies, J.\u00a0N., Picking, R., Cunningham, S.: \u201cRule dependencies in access control lists,\u201d in Proc. of the IADIS International Conference on WWW\/Internet, 10 (2006)"},{"key":"557_CR10","first-page":"61","volume":"20","author":"S Hachana","year":"2015","unstructured":"Hachana, S., Cuppens-Boulahia, N., Cuppens, F.: Mining a high level access control policy in a network with multiple firewalls. J. Inf. Secur. Appl. 20, 61\u201373 (2015)","journal-title":"J. Inf. Secur. Appl."},{"key":"557_CR11","doi-asserted-by":"crossref","unstructured":"Hadjadj, T.\u00a0E., Tebourbi, R., Bouhoula, A., Ksantini, R.: \u201cOptimization of parallel firewalls filtering rules,\u201d in 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, (2019), pp. 1\u20136","DOI":"10.23919\/SOFTCOM.2019.8903718"},{"issue":"10","key":"557_CR12","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1109\/JSAC.2006.877140","volume":"24","author":"H Hamed","year":"2006","unstructured":"Hamed, H., El-Atawy, A., Al-Shaer, E.: On dynamic optimization of packet matching in high-speed firewalls. IEEE J. Select. Areas Commun. 24(10), 1817\u20131830 (2006)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"557_CR13","doi-asserted-by":"crossref","unstructured":"Harada, T., Tanaka, K., Ogasawara, R., Mikawa, K.: \u201cA rule reordering method via pairing dependent rules,\u201d in 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, (2020), pp. 1\u20139","DOI":"10.1109\/CNS48642.2020.9162170"},{"key":"557_CR14","doi-asserted-by":"crossref","unstructured":"Horvath, M.\u00a0R., Fulp, E.\u00a0W., Wheeler, P.\u00a0S.: \u201cPolicy distribution methods for function parallel firewalls,\u201d in 2008 Proceedings of 17th International Conference on Computer Communications and Networks. IEEE, (2008), pp. 1\u20136","DOI":"10.1109\/ICCCN.2008.ECP.121"},{"key":"557_CR15","unstructured":"Jeremy\u00a0Grossmann, P.\u00a0P., Ziajka, Dominik.: Graphical network simulator-3. [Online]. Available: https:\/\/www.gns3.com\/"},{"key":"557_CR16","unstructured":"Kumar, S.\u00a0K.: \u201cFirewall optimization using cross-domain privacy-preserving,\u201d International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), pp. 455\u2013458, (March-April 2018)"},{"issue":"15","key":"557_CR17","doi-asserted-by":"publisher","first-page":"e3773","DOI":"10.1002\/dac.3773","volume":"31","author":"R Mohan","year":"2018","unstructured":"Mohan, R., Yazidi, A., Feng, B., Oommen, J.: On optimizing firewall performance in dynamic networks by invoking a novel swapping window-based paradigm. Int. J. Commun. Syst. 31(15), e3773 (2018)","journal-title":"Int. J. Commun. Syst."},{"key":"557_CR18","unstructured":"Neji, N.\u00a0B., Bouhoula, A.: \u201cTowards safe and optimal filtering rule reordering for complex packet filters,\u201d in 2011 5th International Conference on Network and System Security. IEEE, (2011), pp. 153\u2013160"},{"key":"557_CR19","doi-asserted-by":"crossref","unstructured":"Paul, O., Laurent, M., Gombault, S.: \u201cA full bandwidth atm firewall,\u201d in European Symposium on Research in Computer Security. Springer, (2000), pp. 206\u2013221","DOI":"10.1007\/10722599_13"},{"issue":"5","key":"557_CR20","first-page":"28","volume":"6","author":"T Srinivasan","year":"2006","unstructured":"Srinivasan, T., Nivedita, M., Mahadevan, V.: Efficient packet classification using splay tree models. IJCSNS Int. J. Comput. Sci. Netw. Secur. 6(5), 28\u201335 (2006)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"557_CR21","doi-asserted-by":"crossref","unstructured":"Tapdiya, A., Fulp, E.\u00a0W.: \u201cTowards optimal firewall rule ordering utilizing directed acyclical graphs,\u201d in 2009 Proceedings of 18th International Conference on Computer Communications and Networks. IEEE, (2009), pp. 1\u20136","DOI":"10.1109\/ICCCN.2009.5235232"},{"key":"557_CR22","doi-asserted-by":"crossref","unstructured":"Trabelsi, Z., Zeidan, S.: \u201cEnhanced session table architecture for stateful firewalls,\u201d in 2018 IEEE International Conference on Communications (ICC), (May 2018), pp. 1\u20137","DOI":"10.1109\/ICC.2018.8422079"},{"key":"557_CR23","unstructured":"F.\u00a0E. W, \u201cOptimization of network firewall policies using ordered sets and directed acyclical graphs,\u201d in Proc. of IEEE Internet Management Conference, (2005)"},{"key":"557_CR24","unstructured":"F.\u00a0E. W, \u201cParallel firewall designs for high-speed networks,\u201d in Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. IEEE, (2006), pp. 1\u20134"},{"key":"557_CR25","doi-asserted-by":"crossref","unstructured":"Wang, C.\u00a0C., Derryberry, J., Sleator, D.\u00a0D.: \u201cO (log log n)-competitive dynamic binary search trees,\u201d in Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. Society for Industrial and Applied Mathematics, (2006), pp. 374\u2013383","DOI":"10.1145\/1109557.1109600"},{"key":"557_CR26","doi-asserted-by":"crossref","unstructured":"Zhichao, P., Daiwu, C., Wenhua, H.: \u201cA load-balancing and state-sharing algorithm for fault-tolerant firewall cluster,\u201d in 2017 4th International Conference on Information Science and Control Engineering (ICISCE). IEEE, (2017), pp. 34\u201337","DOI":"10.1109\/ICISCE.2017.17"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00557-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-021-00557-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00557-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T08:06:53Z","timestamp":1647850013000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-021-00557-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["557"],"URL":"https:\/\/doi.org\/10.1007\/s10207-021-00557-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"21 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest, and this study did not receive any funding.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest and funding"}},{"value":"This article does not contain any studies with animals or human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}