×

Method and system for analyzing security ruleset by generating a logically equivalent security rule-set

  • US 9,578,030 B2
  • Filed: 07/10/2014
  • Issued: 02/21/2017
  • Est. Priority Date: 02/07/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of analyzing an ordered security rule-set comprising a plurality of rules and characterized by at least one extrinsic field specifying both extrinsic and non-extrinsic values, the method comprising:

  • dividing the values specified by the at least one extrinsic field into a first space constituted by all extrinsic values specified in the at least one extrinsic field and a second space constituted by all non-extrinsic values specified in the at least one extrinsic field;

    defining in the first space at least one extrinsic space comprising extrinsic values of the same type;

    upon specifying atomic elements constituting the at least one extrinsic space, partitioning, by a processor, the at least one extrinsic space into two or more equivalence classes, wherein each atomic element in the at least one extrinsic space belongs to one and only one equivalence class, and wherein partitioning into equivalence classes is provided by mapping each atomic element of the at least one extrinsic space over all groups of extrinsic values specified for the security rule-set, each equivalence class constituted by one or more atomic elements of the at least one extrinsic space that appear in same groups exactly;

    mapping, by the processor, said equivalence classes over the security rule-set;

    analyzing, by the processor, the security rule-set using the results of mapping said equivalence classes over the security rule-set, wherein analyzing the security rule-set in regard to the first space is provided independently from analyzing the security rule-set in regard to the second space; and

    using the results of analyzing to generate, by the processor, a logically equivalent security rule-set specifying the rules in regard to the equivalent classes, wherein the logically equivalent security rule-set is usable in operation of a security gateway to control at least one of (i) inbound and outbound traffic related to a network and (ii) access to network resources.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×