Hybrid tree-rule firewall for high speed data transmission

Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan

    Research output: Contribution to journalArticleAcademicpeer-review

    5 Citations (Scopus)
    147 Downloads (Pure)


    Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create rule conflicts, and slows down the firewall. To overcome this problem, we have proposed a Tree-rule firewall in our previous study. Although the Tree-rule firewall guarantees no conflicts within its rule set and operates faster than traditional firewalls, keeping track of the state of network connections using hashing functions incurs extra computational overhead. In order to reduce this overhead, we propose a hybrid Tree-rule firewall in this paper. This hybrid scheme takes advantages of both Tree-rule firewalls and traditional listed-rule firewalls. The GUIs of our Tree-rule firewalls are utilized to provide a means for users to create conflict-free firewall rules, which are organized in a tree structure and called 'tree rules'. These tree rules are later converted into listed rules that share the merit of being conflict-free. Finally, in decision making, the listed rules are used to verify against packet header information. The rules which have matched with most packets are moved up to the top positions by the core firewall. The mechanism applied in this hybrid scheme can significantly improve the functional speed of a firewall.
    Original languageEnglish
    Article number7452587
    Pages (from-to)1237-1249
    Number of pages13
    JournalIEEE transactions on cloud computing
    Issue number4
    Early online date14 Apr 2017
    Publication statusPublished - Oct 2020


    • Firewall
    • cloud network
    • computer network
    • high speed firewall
    • network security


    Dive into the research topics of 'Hybrid tree-rule firewall for high speed data transmission'. Together they form a unique fingerprint.

    Cite this