
 
However, the firewall administrator is who 
ultimately decides if an inconsistent rule is faulty. 
In this paper, we have proposed a new 
inconsistency isolation algorithm for firewalls with 
five integer (or intervals of integer). Our approach 
has been based on an analysis of which data type 
each rule selector can to store, on the design of 
specialized abstract data types for each one, and on 
divide and conquer algorithm. A theoretical 
algorithmic complexity as well as an experimental 
performance analysis has been made in order to 
validate our theoretical results.  
Our proposal represents an algorithm that is 10 to 
100 times faster then the current best known one. 
Furthermore, results are returned over the original, 
unmodified ACL in our case, rather than over a 
decomposed ACL which is different than the 
original one.  
However, our approach has some limitations that 
give us opportunities for improvement in future 
works. A performance analysis of each part ADT of 
the algorithm is necessary in order to know where 
the bottleneck is now, in order improve even more 
the algorithms. Checking the behaviour of the 
proposed ADTs in dynamic environments could be 
another interesting point, where another comparison 
in complexity and memory requirements to 
Baboescu algorithm would be a point. 
ACKNOWLEDGEMENTS 
This work has been partially funded by Spanish 
Ministry of Science and Education project under 
grant DPI2006-15476-C02-01, and by FEDER 
(under ERDF Program). 
REFERENCES 
Al-Shaer, E., Hamed, H. Modeling and Management of 
Firewall Policies. IEEE eTransactions on Network and 
Service Management (eTNSM) Vol.1, No.1, 2004. 
Baboescu, F., Varguese, G. Fast and Scalable Conflict 
Detection for Packet Classifiers. Computers & Networks 
Vol.42, No.6, Elsevier 2003. 
Bollig, B., Wegener, I. Improving the Variable Ordering of 
OBDDs is NP-Complete. IEEE Transactions on 
Computers, Vol.45 No.9, September 1996. 
Cormen, T., Leiserson, C., Rivest, R., Stein, C. Introduction 
to Algorithms, 2nd Ed. McGraw-Hill, 2001. 
Chiang, Y., Tamassia, R. Dynamic Algorithms in 
Computational Geometry. Technical Report CS-91-24. 
Brown University, Providence, RI, USA, 1991. 
de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, 
O. Computational Geometry: Algorithms and 
Applications. Springer-Verlag, Berling, 1997. 
Edelsbrunner, H. A new approach to rectangle intersections, 
Part II. International Journal on Computational 
Mathematics. Vol.13, pp. 221-229, 1983. 
Edelsbrunner2, H. A new approach to rectangle intersections, 
Part I. International Journal on Computational 
Mathematics. Vol.13, pp. 209-219, 1983. 
Eppstein, D., Muthukrishnan, S. Internet Packet Filter 
Management and Rectangle Geometry. Proceedings of 
the Annual ACM-SIAM Symposium on Discrete 
Algorithms (SODA), January 2001. 
García-Alfaro, J., Boulahia-Cuppens, N., Cuppens, F. 
Complete Analysis of Configuration Rules to Guarantee 
Reliable Network Security Policies, Springer-Verlag 
International Journal of Information Security. Vol.7, 
No.2, 2008. 
Gupta, P., McKcown, N. Packet classification on multiple 
fields. Proceedings of the ACM SIGCOMM. Cambridge, 
MA, USA. September 1999. 
Hamed, H., Al-Shaer, E. Taxonomy of Conflicts in Network 
Security Policies. IEEE Communications Magazine 
Vol.44, No.3, 2006. 
Hari, B., Suri, S., Parulkar, G. Detecting and Resolving 
Packet Filter Conflicts. Proceedings of IEEE INFOCOM, 
March 2000. 
Liu, Alex X., Gouda, Mohamed G., "Complete Redundancy 
Removal for Packet Classifiers in TCAMs," IEEE 
Transactions on Parallel and Distributed Systems, 24 
Sept. 2008. IEEE computer Society Digital Library. IEEE 
Computer Society. 
Luis, S., Condell, M. Security policy protocol. IETF Internet 
Draft IPSPSPP-01, 2002. 
Pozo1, S., Ceballos, R., Gasca, R.M. Model Based 
Development of Firewall Rule Sets: Diagnosing Model 
Faults. Information and Software Technology Journal, 
No. 51, Issue 5, pp. 894-915. Elsevier, 2009. 
Pozo2, S., Ceballos, R., Gasca, R.M.. A Heuristic Polynomial 
Algorithm for Local Inconsistecy Diagnosis in Firewall 
Rule Sets. 3rd International Conference on Security and 
Cryptography (SECRYPT), in International Conference 
on e-Business and Telecommunications (ICETE). Porto, 
Portugal. INSTICC Press, 2008. 
Srinivasan, V., Varguese, G, Suri, S., Waldvogel, M. Fast and 
Scalable Layer Four Switching. Proceedings of the ACM 
SIGCOMM conference on Applications, Technologies, 
Architectures and Protocols for Computer 
Communication, Vancouver, British Columbia, Canada, 
ACM Press, 1998. 
Taylor, David E. Survey and taxonomy of packet 
classification techniques. ACM Computing Surveys, 
Vol.37, No.3, 2005. 
Wool, A. A quantitative study of firewall configuration errors. 
IEEE Computer, Vol.37, No.6, 2004. 
Yuan, L., Mai, J., Su, Z., Chen, H., Chuah,, C. Mohapatra, P. 
FIREMAN: A Toolkit for FIREwall Modelling and 
ANalysis. IEEE Symposium on Security and Privacy 
(S&P’06). Oakland, CA, USA. May 2006. 
EFFICIENT ALGORITHMS AND ABSTRACT DATA TYPES FOR LOCAL INCONSISTENCY ISOLATION IN
FIREWALL ACLS
53