Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th

International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems

An Analysis Method for IPv6 Firewall Policy

Yi Yin, Guoqiang Zhang Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa


School of Computer Science and Technology Takahashi
Nanjing Normal University Department of Computer Science and Engineering
Nanjing, China Nagoya Institute of Technology
yi837@hotmail.com, guoqiang@ict.ac.cn Nagoya, Japan
{tateiwa, katayama, naohisa}@ nitech.ac.jp

Yun Wang Chao Zhang


School of Computer Science and Engineering The 28th Research Institute of China Electronics
Southeast University Technology Group Corporation
Nanjing, China Nanjing, China
101004974@seu.edu.cn 13584017650@163.com

Abstract—Firewalls play a vitally important role to network analysis methods based on IPv4 are not suitable for IPv6
security. Packet filtering in firewall either accepts or denies or have low effectiveness. The main reason of this
network packets based upon a set of pre-defined rules called situation is that the range of IPv6 address is much bigger
firewall policy. Management of firewall policy is a boring than the range of IPv4 address. There also have very little
task and is always prone to error. There have been a lot of researches about IPv6 firewall policy [10]-[11]. Among
analysis methods for anomalies detection of IPv4 firewall them, the distributed firewall policy detection tool ad6 [10]
policy. But, for the reason of enormous address space, these can be used to analyze distributed IPv6 networks firewall
methods either could not be used to deal with IPv6 firewall policies, but their anomalies were designed for distributed
policy directly, or have low effectiveness. In this work, we environment. In this work, the classification of anomalies
propose a method by using a formal method that can analyze is different with ad6 and our goal is also different with the
the inclusion relations between every two IPv6 firewall rules ad6, we want to detect the anomalies between every two
and detect their anomalies. We have implemented a rules in individual IPv6 firewall policy.
prototype system to verify our proposed method,
In this work, to implement the analysis of IPv6 firewall
experimental results show the effectiveness.
policy rapidly and effectively, we propose a solution to
Keywords- IPv6, Firewall policy, SMT Solver represent every two rules in IPv6 firewall policy into a
formal verification format, and then use SMT solver Z3 to
verify their inclusion relations. At last, according to the
I. INTRODUCTION inclusion relations and actions of rules, we decide their
Recently, many organizations have started using anomalies. The major contributions of this paper are stated
Internet Protocol version 6 (IPv6) [1], because they as follows:
recognized the improvements and technical benefits of x We represented the IPv6 firewall rules as some
IPv6 that can meet the current and future Internet demands. logical formulas and used SMT solver Z3 to verify
IPv6 is a new protocol that offers technical benefits not their inclusion relations. There was no need to
only in addition to a larger addressing space but also takes interpret the meanings of rules by means of
advantage of its security and configuration features. additional complex analysis technology.
As is known to all, firewall is the most widely used
mechanism to guarantee network security, and rule x We classified the anomalies kinds and proposed the
matching is one of the most important technologies to corresponding algorithm to detect them according
firewall. However, firewall rules management is a very to the inclusion relations between rules.
significant task and it is prone to error. Wool shows that x We have developed a prototype system to verify
the “Firewall Complexity” is still positively correlated our proposed method. The experimental results
with the number of detected risk items [2]. Wool also show the time consumption.
inspected firewall policies collected from different
organizations and indicated that all examined firewall This paper is organized as follows. Section II
policies have security flaws[3]. Security flaws often lead to introduces the basic concepts of firewall policy and SMT
anomalies, which caused by conflicts of rules, that is, two solver. Section III describes inclusion relations of IPv6
or more rules match the same packet. To resolve this firewall rules. Section IV presents our proposed anomalies
problem, E. Al-Shaer classified the anomalies in IPv4 detection method of IPv6 policy. Section V introduces our
firewall rules in detail [4]. They also reported prototype system and the experiments. Section VI
comprehensive and in-depth study of automated firewall discusses the relevant works in the similar areas. Finally,
policy analysis for designing, configuring and managing section VII draws the conclusions and future works.
distributed firewalls [5]. Based on the researches of E. Al-
Shaer, there have been developed many researches [6]-[9] II. FIREWALL POLICY AND SMT SOLVER
about anomalies detection in firewall rules. Nevertheless, The slow but steady migration from IPv4 to IPv6 is a
with the network derivation from IPv4 to IPv6, those rule challenge for a variety of organizations. The IPv4 firewall

978-1-7281-2058-4/19/$31.00 ©2019 IEEE 1757


DOI 10.1109/HPCC/SmartCity/DSS.2019.00241
model has been used for more than a decade, and because an internal form rule. An internal form rule, fi (ię[1, n]),
of the enormous huge address space of IPv6, the new IPv6 is represented as follows:
model will require a lot of development and testing, so fi : [ai1, bi1], [ai2, bi2], ......[ait, bit], actioni.
firewall model based on IPv4 will still be used for a period The range values [aij , bij] (ię[1, n], ję[1, t]) represent
of time. the commonly used header fields: SrcIP, DesIP, SrcPort,
A. Structure of Firewall Policy DesPort, and protocol. Assume a packet P with the header
values of P are (x1, x2, ......, xt), if and only if (ai1 İ x1 İ
A firewall policy, FP, usually consists of an ordered set
bi1) ġ (ai2 İ x2 İ bi2) ġ ...... ġ (ait İ xt İ bit), packet P
of n rules {f1, f2, ......, fn}, where if the rule fi is placed
matches the fi, and the action of rule fi is performed on the
before the rule fj in FP (i, j[1, n], and i<j), we say that fi
packet P. For example, the first rule in Fig. 1 was
has the higher priority. Each rule fi includes t predicates,
transformed to the internal form rule shown as in Fig. 2.
p1, p2, ..., pt, and an action shown as follows:
To verify the inclusion relations between every two
fi : pi1 , pi2 , ......, pit, actioni,
rules by using SMT solver Z3 and detect their anomalies,
where t is the number of key fields of header used in
we represented the predicates of internal form rules into
packet filtering. The commonly used header fields are:
logical formula shown as in Fig. 3. The IPv6 address in
protocol, source IP (SrcIP), destination IP (DesIP), source
internal form rule is a very huge integer number, to
port (SrcPort) and destination port (DesPort). Each
analyze the IPv6 address, we split it into 8 small integer
predicate pij (ię[1, n], ję[1, t]) in a rule, is a matching numbers in the logical formula. The logical formula will
condition for a packet header field. For the privacy of the be as the input of SMT solver Z3.
IPv6 firewall rules, it is difficult to get actual rules set,
therefore, in this work, we use the rules that generated by
ClassBenchv6 [16] for the proposed method explanation
and experiments. ClassBenchv6 is an open source tool for
providing reliable and flexible benchmark for future IPv6
based application devise designing. We modified the open
source code and generated the following format IPv6 rules Figure 2. Example of an internal form rule
shown as in Fig. 1. Each rule consists flow label (for
example: @393978-516704), SrcIP/prefix, DesIP/prefix,
SrcPort, DesPort, Protocol, and an action respectively.

Figure 3. Logical formula of the internal form rule shown in Fig. 2

III. INCLUSION RELATIONS OF IPV6 FIREWALL RULES

Figure 1. Example of three IPv6 rules A. Inclusion Relations between Two Rules
When the number of key fields in a packet is n, the
packet can be represented as a point in an n-dimensional
B. SMT Solver and Internal Form of Rules
space called packet space. A rule f is represented as a
Satisfiability Modulo Theories (SMT) problem is a subspace in a packet space called the rule space. It is
decision problem for logical first order formulas with represented as the symbol P(f), which includes the set of
respect to combinations of background theories such as: packets that match the rule f. We also define R(fi, fj) to
arithmetic, bit vectors, arrays, and so on. An SMT solver is represent the inclusion relations between two rules
a tool for deciding the satisfiability of formulas in these spaces P(fi) and P(fj). According to set theory, the
theories. Z3 is a new SMT solver freely available from inclusion relations between two set P(fi) and P(fj), that is,
Microsoft Research [14]. In this paper, we call Z3 solver R(fi, fj) could be classified as five kinds: Equal, Include,
procedurally by using ANSI C API [15]. It is necessary to Inside, Disjoint and Overlap, shown in formula (1). To
transform FP rules into logical formulas so as to use Z3 show the image of the inclusion relations of two rules, for
solver. the simplicity, we suppose packets have two key fields of
Each predicate pij (i ę [1, n], j ę [1, t]) in a rule, is a SrcIP and DesIP, and the two rules fi and fj only consist
matching condition for a packet header field, and it corresponding two predicates (SrcIP, DesIP). Fig. 4 shows
commonly allows four kinds of matching: exact matching, the illustration of five kinds of R(fi, fj) in two dimensional
prefix matching, range matching, and list matching. packet
p space.
p
However, in this work, for the simplicity, each predicate pij
in a rule is represented as a uniform range value, [aij , bij].
Predicates in other forms can be easily converted into one
or multiple rules with range values. A rule where all
predicates are represented as integer range values is called
(1)

1758
B. Decision Method for Inclusion Relations of Rules If the Z3’s output of S2 is UNSAT, which means that
To decide the inclusion relations between two rules fi the set of packets not matched rule fi have no intersection
and fj, that is, R(fi, fj), we provide the decision algorithm with the set of packets matched rule fj. That is to say, the
shown as in Fig. 5. relation of two sets P(fi) ⊇ P(fj) is satisfied, and the R(fi, fj)
In line 4, we constructed the logical formulas S1 = P(fi) could be decided as the Include relation shown in formula
ġ P(fj). The formula S1 wants to check whether the set of (1). Similarly, if the Z3’s output of S3 is UNSAT, the
packets matched rule fi have intersection with the set of relation of two sets P(fi) ⊆ P(fj) is satisfied, and the R(fi, fj)
packets matched fj. If the Z3’s output of S1 is could be decided as the Inside relation. If S2 and S3 are
UNSATISFIABLE(UNSAT), which means that the set of both UNSAT, according to the following formula (2), the
packets matched rule fi have no intersection with the set of relation of two sets P(fi) = P(fj) is satisfied, R(fi, fj) could be
packets matched rule fj. That is to say, R(fi, fj) is the decided as the Equal relation. Above all, the kinds of R(fi,
Disjoint relation shown in formula (1). fj) could be decided according to the Z3’s outputs of three
If Z3’s output of S1 is SATISFIABLE(SAT), R(fi, fj) logical formulas S1~S3.
must not be the Disjoint relation, it is necessary to further
decide. Therefore, we constructed two more logical P(fi) = P(fj) if and only if P(fi)⊇P(fj) and P(fi)⊆P(fj) (2)
formulas S2 = ¬ P(fi) ġ P(fj) and S3 = P(fi) ġ ¬P(fj)
shown as in lines 9-10. The formula S2 wants to check
whether the set of packets not matched rule fi have the IV. ANOMALIES DETECTION METHOD
intersection with the set of packets matched fj. Similarly,
the formula S3 wants to check whether the set of packets A. Anomalies Classification of IPv6 Firewall Rules
matched rule fi have the intersection with the set of packets Anomalies classification was inspired by the work [4]-
not matched fj. Then we use SMT solver Z3 to verify them. [5] and also based on our previous works [18]-[19], we
classify the anomalies between every two rules as error
and warning. Error occurs when the higher priority rule
matches all the packets that matches the lower priority rule,
which will cause the lower priority rule that cannot be
executed. Warning occurs when the higher priority rule
matches part of the packets that matches the lower priority
rule, which results in low priority rule sometimes being
executed. If there have two IPv6 rules pair (fi, fj) where fi
precedes fj in execution, we classify error and warning as
in the following four kinds.
(1) Shadowing error: Shadowing error occurs when the
lower priority rule fj is never executed as the previous
rule fi matches all the packets that match the rule fj.
Figure 4. Illustration of inclusion relations between two rules For example, two rules shown in Fig. 6 are different
at the prefix of DesIP, the second rule will never be
executed because the first rule matches all the packets
that matches the second rule. In this case, the second
rule is shadowed by the first rule, and it is never
executed.

Figure 6. Fig. 6 Shadowing error example

(2) Redundancy error: This error occurs when the


lower priority rule fj is never executed as the previous
rule fi prevents it from execution. Redundant rule
unnecessarily increases the size of the rules. Even if
the redundant rules are removed, it will not cause any
change. For example, if the actions of two rules
shown in Fig. 6 are the same, the second rule is a
redundant rule to the first rule.
(3) Generalization warning: This warning occurs when
Figure 5. Inclusion relation decision algorithm of two rules
the lower priority rule fj is executed only when the
packets do not match the previous rule fi. For

1759
example, two rules shown in Fig. 7 exist destination port of the transport layer. Nevertheless, the
generalization warning. author of classbenchv6 mentioned that there appeared
(4) Correlation warning: In this case, the lower priority some new fields in IPv6 other than IPv4, such as flow
rule fj is only executed when a certain range of the labels [21]. It is defined as a 20-bit random number in
packets arrive. For example, two rules shown in Fig. RFC3697, where also specifies a single data flow can be
8 exist correlation warning, where their DesPort are identified by flow label conjunction with source address
overlap for some certain ranges. and destination address [22]. Therefore, flow labels will be
possible to provide a new opportunity for the next
generation of Internet stream identifiers. In fact, flow label
could be viewed as the sequence number to identify each
IPv6 firewall rule.
A. Prototype System
We implemented a prototype system to verify our
proposed method. The prototype system implemented
Figure 7. Generalization warning example using the C language. The experiments were performed on
a computer equipped with an Intel Core i7-7700 CPU
running at 3.6GHz and 8GB of RAM. We use
classbenchv6 [20] to generate IPv6 firewall policy as the
input of our prototype system.
In addition, we designed a visual interface by using Qt
framework for our prototype system. Fig. 10 shows the
architecture and the main functions of the prototype
Figure 8. Correlation warning example system. The dashed line rectangle in Fig. 10 will loop for
every two rules until the whole IPv6 firewall policy are
checked. Fig. 11 shows the visual interface of the
B. Algorithms of Anomalies Detection Method execution of the prototype system. The scale in the
We provided the anomalies detection algorithm anomalies detection results represents the number of rules.
between two IPv6 firewall rules shown as in Fig. 9. A We use the flow label to identify each rule.
shadowing error occurs when the following condition is
true, which is shown in the line 6 of Fig. 9.
R(fi, fj) = Equal or Include, and fi.action ≠ fj.action
A redundancy error occurs when the following
condition is true, which is shown in the line 8 of Fig. 9.
R(fi, fj) = Equal or Include, and fi.action = fj.action
A generalization warning occurs when the following
condition is true, which is shown in the line 10 of Fig. 9.
R(fi, fj) = Inside, and fi.action ≠ fj.action
A correlation warning occurs when the following
condition is true, which is shown in line 12 of Fig. 9.
R(fi, fj) = Overlap, and fi.action ≠ fj.action

Figure 10. Architecture of the prototype system

Figure 9. Anomalies detection algorithm

V. IMPLEMENTATION AND EXPERIMENTS


Traditional rules usually identify and classify packets
based on 5-triples, that is, the source IP address, Figure 11. Anomalies detection results of the prototype system
destination IP address, protocol, source port and

1760
B. Experiment and Consideration with arbitrary ranges. There also some researches about the
In this work, we did following two groups experiments. comparison between global security policy and firewall
Group one: Each rule only consists of flow label and policy [10]-[13]. The existing IPv4 firewall rules
two predicates (source IP address, destination IP address) anomalies detection researches are difficult to extend for
and an action. We measured the time consumption that the the IPv6 firewall rules, or have the low effectiveness.
prototype system detected all the anomalies between every
two rules.
z Experiment 1: The number of rules ranged from 50 to
500, which are suitable for the medium sized firewall
z Experiment 2: The number of rules range from 200 to
2000, which are suitable for the large sized firewall
Group two: Each rule consists of flow label, five
predicates (source IP address, destination IP address,
source port, destination port, protocol) and an action. We
measured the time consumption that the prototype system
detected all the anomalies between every two rules.
z Experiment 1: The number of rules range from 100 to
500, which are suitable for medium sized firewall. Figure 12. Time consumption for anomalies detection of medium scale
rules
z Experiment 2: The number of rules range from 200 to
2000, which are suitable for large sized firewall.
The experimental results are shown as in Fig. 12 and
Fig. 13. The results of the time consumption include the
time of reading and combining every two rules, building
SMT formulas, using Z3 to solve the logical formulas and
deciding all the anomalies. The results in Fig. 12 show that
when the number of rules ranged from 50 to 500, it took
about 1 second to 120 seconds to detect and report all the
anomalies. The results in Fig. 13 show that when the
number of rules ranged from 200 to 2000, it took about 19
seconds to 1800 seconds to detect and report all the
anomalies. Although, the whole time consumption for the
anomalies detection increases with the quantity of rules,
we have implemented the analysis of IPv6 firewall policy Figure 13. Time consumption for anomalies detection of large scale
and anomalies detection preliminarily. rules

VI. RELATED WORK


B. Anomalies Detection of IPv6 firewall rules
A. IPv4 Firewall Rules Anomalies Detection Works The similarly research with our work is the network
Wool [3] recently inspected firewall policies collected anomaly detection tool ad6 [14], it can be used to analyze
from different organizations and indicated that all the IPv6 networks with an emphasis on firewalls. The
examined firewall policies have security flaws. Therefore, detected invariants include unreachable or shadowed rules,
anomalies classification and discovery of IPv4 firewall cycles, and cross path anomalies. The tool models
rules have gained a lot of attention, and many related firewalls and networks as a boolean satisfiability problem
methods were proposed [4]-[10]. Al-Share and Hamed [4]- and uses a SAT solver for verification. In this work, we
[5] classified the kinds of anomalies in detail and provided classify the different anomalies with ad6, and our goal is
the anomalies detection methods. Work [6] reported also different with the ad6. Their anomalies were designed
comprehensive and in-depth study of automated firewall for distributed environment, but we want to detect the
policy analysis for designing, configuring and managing anomalies between every two rules in individual IPv6
distributed firewalls. It also provided methodologies, firewall policy.
techniques, tools and case studies. Work [7] proposed a
C. Other Researches about IPv6 firewall rules
novel anomaly management framework that facilitates
systematic detection and resolution of firewall policy A verification system for IPv6 enabled networks FaVe
anomalies. Work [8] designed an open source conflict [15] propose a solution for the integration of IPv6 firewalls
resolution framework (C application and Linux firewall into a formal verification framework based on the fast
kernel module on top of Netfilter) that can be used as a NetPlumber ([16]) engine. The modeling of the Linux
constant independent system auditor, automatically ip6tables/netfilter firewall with dynamic support for
detecting and resolving conflicts in firewall rules. Research extension header chains as well as the modeling of a proxy
[9] presented a series of algorithms and defined new data based application layer gateway deliver the elements
structures to process range fields with their boundary necessary for a comprehensive verification of complex
addresses. The algorithm based on new bit vectors can IPv6 networks. There exist some researches about rule
detect partial overlaps between multidimensional filters matching algorithms in IPv6 environment [17]-[18]. Work

1761
[17] combined the real number coding differential [6] E. Al-Shaer, “Automated Firewall Analytics Design, Configuration
evolution algorithm with the traditional packet matching and Optimization”, Springer International Publishing, 2014.
algorithm, and developed a new algorithm. Applying the [7] H. Hu, G.-J. Ahn, K. Kulkarni, “Detecting and resolving firewall
algorithm to IPv6 network that the packet can linear speed policy anomalies”, IEEE Transactions on Dependable and Secure
Computing, Vol.9, No.3, pp. 318–331, May 2012.
forward. Work [18] proposed a high performance rule
[8] A. Papagrigoriou, P. Petrakis, M.D.Grammatikakis, “A firewall
matching algorithm suitable for IPv6, named HiPRM module resolving rules consistency”, 13th Workshop on Intelligent
(High Performance Rule Matching). The above mentioned Solutions in Embedded Systems, WISES 2017, pp.47-50, June 12-
researches were not used for anomalies detection in IPv6 13, 2017.
firewall rules. [9] C.Y. Lai, P.C. Wang, “Fast and complete conflict detection for
packet classifiers”, IEEE Systems Journal, Vol.11, No.2, pp. 1137-
VII. CONCLUSION AND FUTURE WORKS 1148, Dec. 2014.
[10] A. Saˆadaoui, N.B.Y.B. Souayeh and A. Bouhoula, “Formal
In this paper, we have proposed a method that can approach for managing firewall misconfigurations”, International
analyze the huge IPv6 address space and detect the Conference on Research Challenges in Information Science, 2014.
anomalies between every two rules in an individual IPv6 [11] A.Saâdaoui,S. Ben, N.B.Y.B.Souayeh, A.Bouhoula, “A new FDD-
firewall policy. We firstly transform each rule into an based method for distributed firewall misconfigurations resolution”,
internal form of rule, and then construct logical formulas 14th, European, Mediterranean, and Middle Eastern Conference,
between every two rules. At last, we use SMT solver Z3 to EMCIS, v 299,, pp 369-383, 2017.
verify and then decide the anomalies. We also [12] Yin, Y., Xu, X., Takahashi, N.: Verifying Consistency between
implemented a prototype system and did some experiments Security Policy and Firewall Policy by Using a Constraint
Satisfaction Problem Server, 2011 International Conference on
to show the time consumption of our proposed method. Future Wireless Networks and Information Systems, LNCS, vol.
Our future work includes optimization of our proposed 144, pp. 135̽145, Springer, Heidelberg (2012).
method and results visualization. We also want to extend [13] Yi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama and
our method to detect the anomalies between abstract Naohisa Takahashi, "An Inconsistency Detection Method for
security policy and actual IPv6 firewall rules, and also Security Policy and Firewall Policy Based on CSP Solver", Proc.
extend our method to other rule-based systems. of ICCCS2017, Part II, LNCS 10603, pp.147–161, Jun. 2017.
[14] C. Lorenz and B. Schnor, "Policy Anomaly Detection for
ACKNOWLEDGMENT Distributed IPv6 Firewalls", in International Conference on
Security and Cryptography (SECRYPT 2015), Colmar, France,
This research was supported by CERNET Innovation 2015.
Project (No. NGII20170402), and also partially supported [15] C. Lorenz, S. Kiekheben, B. Schnor, "FaVe: Modeling IPv6
by National Natural Science Foundation of China (No. Firewalls for Fast Formal Verification", International Conference
61772279). This work also partially supported by National on Networked Systems, NetSys 2017, April 18, Germany.
Key Research Plan (Grant No. 2017YFC0840202) and [16] P. Kazemian, M. Chan, H. Zeng, G. Vadrghese, N. McKeown, and
S. Whyte, “Real Time Network Policy Checking Using Header
Collaborative Innovation Center of Novel Software Space Analysis,” in Proceedings of the 10th USENIX Symposium
Technology and Industrialization, and also partially on Networked Systems Design and Implementation, Lombard, IL,
supported by National Project Grant (No. 315055101). USA, April 2-5, 2013. USENIX Association, 2013, pp. 99–111.
[17] W.Z. Lin, Z.J. Wu, L. Yi, “High-Dimension Large-Scale Packet
Matching Algorithm in IPv6”, Acta Electronica Sinica, Vol. 41, No.
REFERENCES 11, Nov. 2013, pp. 2181-2186. (In Chinese)
[18] L.H.Pang, F.Jiang, “Research on High Performance Rule Matching
Algorithm in IPv6 Networks”, Computer Science, Vol. 44, No. 3,
[1] S. Deering and R. Hinden, “Internet Protocol Version 6 (IPv6)
Mar. 2017, pp. 158-162. (In Chinese)
Specification”, RFC 2460, December 1998.
[19] L.D.Moura,N.Bjorner, “Z3: An Efficient SMT Solver”,
[2] A. Wool, “Firewall Configuration Errors Revisited”, IEEE Internet
Proceedings of the Theory and practice of software, 14th
Computing, Vol. 14, No. 4, pp.58-65, 2009.
international conference on Tools and algorithms for the
[3] A. Wool, “Trends in Firewall Configuration Errors: Measuring the construction and analysis of systems, 2008, pp. 337-340.
Holes in Swiss Cheese”, IEEE Internet Computing, vol. 14, no. 4,
[20] Q. Sun, X. Huang, W. Yang, X. Zhou, Y. Ma, and C. Wang,
pp. 58-65 (2010).
“ClassBenchv6: An IPv6 Packet Classification Benchmark”,
[4] E. Al-Share, H. Haned, R. Boutaba, and M. Hasan, “Conflict GLOBECOM, page 1-6. IEEE, 2009.
classification and analysis of distributed firewall policies”, IEEE
[21] Q. Sun, “Research on the Packet Labeling and Lookup Technology
Journal on Selected Areas in Communication, Vol.23, No.10,
in the Next Generation Internet”, doctoral thesis, School of
pp.2069-2084, 2005.
Computer Science and Technology, Beijing University Of Posts
[5] H. Hamed, AI. Shaer, “Taxonomy of Conflicts in Network Security and Telecommunications, May, 2010.
Policies”, IEEE Commn Magazine, vol.44, no.3, pp.134-141, 2006.
[22] J. Rajahalme, A. Conta, B. Carpenter and S. Deedng, “lPv6 Flow
Label Specification, “, RFC3697, Mar. 2004.

1762

You might also like