{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:12:18Z","timestamp":1750824738235,"version":"3.41.0"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2018]]},"DOI":"10.1587\/transcom.2017ebt0002","type":"journal-article","created":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T22:03:47Z","timestamp":1502143427000},"page":"528-537","source":"Crossref","is-referenced-by-count":0,"title":["Workload Estimation for Firewall Rule Processing on Network Functions Virtualization"],"prefix":"10.23919","volume":"E101.B","author":[{"given":"Dai","family":"SUZUKI","sequence":"first","affiliation":[{"name":"Fujitsu Laboratories Ltd."}]},{"given":"Satoshi","family":"IMAI","sequence":"additional","affiliation":[{"name":"Fujitsu Laboratories Ltd."}]},{"given":"Toru","family":"KATAGIRI","sequence":"additional","affiliation":[{"name":"Fujitsu Laboratories Ltd."}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] D. Suzuki, S. Imai, and T. Katagiri, \u201cA new index of hidden workload for firewall rule processing on virtual machine,\u201d International Conference on Computing, Networking and Communications (ICNC), pp.632-637, Jan. 2017. 10.1109\/iccnc.2017.7876203","DOI":"10.1109\/ICCNC.2017.7876203"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] K. Salah, K. Elbadawi, and R. Boutaba, \u201cPerformance modeling and analysis of network firewalls,\u201d IEEE Network and Service Management, vol.9, no.1, pp.12-21, March 2012. 10.1109\/tnsm.2011.122011.110151","DOI":"10.1109\/TNSM.2011.122011.110151"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] K. Salah, \u201cAn analytical model to achieve elasticity for cloud-based firewalls,\u201d Conference on Local Computer Networks (LCN), pp.173-176, July 2015. 10.1109\/lcn.2015.7366299","DOI":"10.1109\/LCN.2015.7366299"},{"key":"4","unstructured":"[4] A.J. Melara, Performance Analysis of the Linux Firewall in a Host, Master&apos;s thesis, California Polytechnic State University, June 2002."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] J. Liu, \u201cEvaluating standard-based self-virtualizing devices: A performance study on 10 GbE NICs with SR-IOV support,\u201d 2010 IEEE International Symposium on Parallel Distributed Processing (IPDPS), pp.1-12, April 2010. 10.1109\/ipdps.2010.5470365","DOI":"10.1109\/IPDPS.2010.5470365"},{"key":"6","unstructured":"[6] \u201cLinux Netfilter,\u201d Available: https:\/\/www.netfilter.org"},{"key":"7","unstructured":"[7] \u201cENERGY STAR Program Requirements Product Specification for Large Network Equipment,\u201d Sept. 2015. Available: https:\/\/www.energystar.gov\/sites\/default\/files\/Final%20LNE%20V1.0%20Test%20Method.pdf"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] S. Acharya, J. Wang, Z. Ge, T.F. Znati, and A. Greenberg, \u201cTraffic-aware firewall optimization strategies,\u201d IEEE International Conference on Communications (ICC), vol.5, pp.2225-2230, June 2006. 10.1109\/icc.2006.255101","DOI":"10.1109\/ICC.2006.255101"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] M.R. Horvath, E.W. Fulp, and P.S. Wheeler, \u201cPolicy distribution methods for function parallel firewalls,\u201d IEEE Computer Communications and Networks, pp.1-6, Aug. 2008. 10.1109\/icccn.2008.ecp.121","DOI":"10.1109\/ICCCN.2008.ECP.121"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] E.M. El-Alfy, \u201cA heuristic approach for firewall policy optimization,\u201d Advanced Communication Technology, The 9th International Conference, vol.3, pp.1782-1787, Feb. 2007. 10.1109\/icact.2007.358716","DOI":"10.1109\/ICACT.2007.358716"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] H. Hamed, and E. AlShaer, \u201cDynamic rule-ordering optimization for highspeed firewall filtering,\u201d ACM Symposium on Information, computer and communications security (ASIACCS), vol.19, pp.332-342, 2006. 10.1145\/1128817.1128867","DOI":"10.1145\/1128817.1128867"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] Z. Trabelsi, L. Zhang, and S. Zeidan, \u201cDynamic rule and rule-field optimisation for improving firewall performance and security,\u201d IET Information Security, vol.8, no.4, pp.250-257, 2014. 10.1049\/iet-ifs.2011.0146","DOI":"10.1049\/iet-ifs.2011.0146"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] Z. Trabelsi and S. Zeidan, \u201cMultilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement,\u201d IEEE International Conference on Communications (ICC), pp.1074-1078, June 2012. 10.1109\/icc.2012.6364218","DOI":"10.1109\/ICC.2012.6364218"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] D. Rovniagin and A. Wool, \u201cThe geometric efficient matching algorithm for firewalls,\u201d IEEE Trans. Dependable and Secure Computing, pp.147-159, 2011. 10.1109\/tdsc.2009.28","DOI":"10.1109\/TDSC.2009.28"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] F. Guenane, H. Boujezza, M. Nogueira, and G. Pujolle, \u201cAn architecture to manage performance and reliability on hybrid cloud-based firewalling,\u201d IEEE\/IFIP Network Operations and Management Symposium: Management in a Software Defined World (NOMS), Jan. 2014. 10.1109\/noms.2014.6838334","DOI":"10.1109\/NOMS.2014.6838334"},{"key":"16","unstructured":"[16] J. Deng, H. Hu, H. Li, Z. Pan, K. Wang, G. Ahn, J. Bi, and Y. Park, \u201cVNGuard: An NFV\/SDN combination framework for provisioning and managing virtual firewalls,\u201d IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), pp.107-114, Jan. 2015. 10.1109\/nfv-sdn.2015.7387414"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] M. Yoon, S. Chen, and Z. Zhang, \u201cMinimizing the maximum firewall rule set in a network with multiple firewalls,\u201d IEEE Trans. Comput., vol.59, no.2, pp.218-230, 2010. 10.1109\/tc.2009.172","DOI":"10.1109\/TC.2009.172"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] M.A. El-Refaey, and M.A. Rizkaa, \u201cVirtual systems workload characterization: An overview,\u201d International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp.72-77, July 2009. 10.1109\/wetice.2009.13","DOI":"10.1109\/WETICE.2009.13"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] M.H. Jamal, A. Qadeer, W. Mahmood, A. Waheed, and J.J. Ding, \u201cVirtual machine scalability on multi-core processors based servers for cloud computing workloads,\u201d Networking, Architecture, and Storage (NAS), pp.90-97, 2009. 10.1109\/nas.2009.20","DOI":"10.1109\/NAS.2009.20"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] H. Lin, X. Qi, S. Yang, and S.P. Midkiff, \u201cWorkload-driven VM consolidation in cloud data center,\u201d Parallel and Distributed Processing Symposium (IPDPS), pp.207-216, May 2015. 10.1109\/ipdps.2015.90","DOI":"10.1109\/IPDPS.2015.90"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] J.J. Jheng, F.H. Tseng, H.C. Chao, and L.D. Chou, \u201cA novel VM workload prediction using Grey Forecasting model in cloud data center,\u201d International Conference on Information Networking (ICOIN), pp.40-45, Feb. 2014. 10.1109\/icoin.2014.6799662","DOI":"10.1109\/ICOIN.2014.6799662"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] F. Qiu, B. Zhang, and J. Guo, \u201cA deep learning approach for VM workload prediction in the cloud,\u201d 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD), pp.319-324, 2016. 10.1109\/snpd.2016.7515919","DOI":"10.1109\/SNPD.2016.7515919"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] Y. Hu, B. Deng, F. Peng, and D. Wang, \u201cWorkload prediction for cloud computing elasticity mechanism,\u201d IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp.244-249, July 2016. 10.1109\/icccbda.2016.7529565","DOI":"10.1109\/ICCCBDA.2016.7529565"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] K. Qazi, Y. Li, and A. Sohn, \u201cWorkload prediction of virtual machines for harnessing data center resources,\u201d IEEE 7th International Conference on Cloud Computing, pp.522-529, Aug. 2014. 10.1109\/cloud.2014.76","DOI":"10.1109\/CLOUD.2014.76"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E101.B\/2\/E101.B_2017EBT0002\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T20:56:08Z","timestamp":1750798568000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E101.B\/2\/E101.B_2017EBT0002\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2017ebt0002","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"type":"print","value":"0916-8516"},{"type":"electronic","value":"1745-1345"}],"subject":[],"published":{"date-parts":[[2018]]}}}