Skip to main content

Table 9 An example for CRS calculation for the order of rules 1–14 (Policy 1) of Table 2

From: Ant colony optimization-based firewall anomaly mitigation engine

Segments

                  

Action constraints generated by Algorithm 2 for Policy 1

A

A

A

A

A

A

A

D

A

D

A

D

A

A

A

D

A

D

Action in first vertically appearing block in the segments of Table 4

A

A

A

A

A

A

D

D

A

A

A

A

A

A

A

A

A

D

Satisfied (S)/not satisfied (NS)

S

S

S

S

S

S

NS

S

S

NS

S

NS

S

S

S

NS

S

S

  1. A allow, D deny