Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Performance Evaluation Model for Application Layer Firewalls

Abstract

Application layer firewalls protect the trusted area network against information security risks. However, firewall performance may affect user experience. Therefore, performance analysis plays a significant role in the evaluation of application layer firewalls. This paper presents an analytic model of the application layer firewall, based on a system analysis to evaluate the capability of the firewall. In order to enable users to improve the performance of the application layer firewall with limited resources, resource allocation was evaluated to obtain the optimal resource allocation scheme in terms of throughput, delay, and packet loss rate. The proposed model employs the Erlangian queuing model to analyze the performance parameters of the system with regard to the three layers (network, transport, and application layers). Then, the analysis results of all the layers are combined to obtain the overall system performance indicators. A discrete event simulation method was used to evaluate the proposed model. Finally, limited service desk resources were allocated to obtain the values of the performance indicators under different resource allocation scenarios in order to determine the optimal allocation scheme. Under limited resource allocation, this scheme enables users to maximize the performance of the application layer firewall.

Introduction

The current era of rapid internet technology development is witnessing widespread use of network communication in daily life, and hence, it is being increasingly influenced by internet security issues. Although users benefit significantly from the convenience afforded by internet technology, they are deeply concerned by their exposure to various network security risks. The need for achieving a trade-off between convenience and risk avoidance has led to the emergence of network security as an important issue. Consequently, a firewall has been introduced as a network security technology. A firewall is a rule engine that uses a collection of rules to match data packets with the rules in a rule matching process based on the order of the data packets. This is done until a matching rule is obtained, which determines the action to be applied to the corresponding packet as set forth by the rule.

Although application layer firewalls can provide comprehensive security, they have an adverse effect on network traffic processing performance. All traffic should be processed through the application layer firewall, so it is very likely to become the bottleneck of network communication and affect the user experience. In the firewall design and development process, a series of experiments is required to verify the system resource allocation in order to maximize the overall performance of the equipment. Although extensive testing is necessary, it is time-consuming and incurs high resource costs. If a mathematical model with a high degree of fit to application layer firewalls can be developed and used to analyze the key performance indicators of these firewalls, firewall developers can significantly reduce the testing time and developmental costs. Toward this end, the present article uses mathematical queuing theory as a basis to establish a performance evaluation model for application layer firewalls. The model is used to develop a resource allocation scheme with optimal performance indicators. Thus, it achieves the objective of effectively guiding firewall design.

The remainder of this paper is organized as follows. Section II reviews related studies and highlights our specific innovations. Section III presents the overall model and mathematical deductions. Section IV describes a simulation study of the model, in which resource allocation analysis is conducted with limited resources. Finally, Section V summarizes the study and concludes the paper.

Related work

Firewall systems have been investigated for many years. Cyber threats are becoming more sophisticated, and the attack methods and frequency of attacks are increasing [1]. An application layer firewall mainly includes the analysis of the user behavior, rule-based detection, and defense against DDoS attacks [2]. Prokhorenko V et al. proposed a supervision framework and a web application protection model [3, 4]. Peng et al. discussed the related content of forensic authorship analysis [5]. They analyzed user profiling in intrusion detection [6] and they conducted a thorough study of astroturfing detection in media [7, 8]. Osanaiye et al. studied the defense against DDoS attack, and presented a taxonomy of the different types of cloud DDoS attacks, and the corresponding DDoS defense taxonomy [9]. In addition, they also proposed an Ensemble-based multi-filter feature selection method to detect DDoS attacks in cloud computing [10].

Several researchers have made important contributions to the development of firewall technology and optimization of network performance [1120]. Some researchers have investigated the process of network packet acceptance in Linux or FreeBSD [21, 22], while others have adopted queuing theory to model systems more effectively [2326]. Previous studies on modeling and analysis of network equipment performance have yielded some well-established results, especially in relation to findings based on queuing theory. Some studies have used the general queuing model (e.g., M/M /1, M/G/1, M/G/M/K, and Erlang’s formula) to capture and analyze the behaviors of cloud systems and applications [2729]. Salah et al. studied the multi-service-desk queuing system [30]. This system consists of two service stages, the second of which involves multiple service desks. The model mainly evaluates the response time of cloud applications on the basis of performance indicators such as throughput, request loss probability, queuing probability, and CPU utilization. An extension of this model to a system with three service stages has been discussed, where both the second stage and the third stage involve multiple service desks [31, 32]. At the University of Electronic Science and Technology, China, Yang et al. established an M/M/m/m+r model to study the response time distribution of cloud service systems [33]. Similarly, Khazaei et al. modeled cloud computing centers using an M/G/m/m+r model, i.e., an approximate analytical model, to accurately estimate the complete probability distribution of the request response time and other important performance indicators [34].

Some key research articles have discussed the application of queuing theory to the analytical modeling of application layer firewalls and other security gateway devices. Salah, who conducted numerous studies in this area, obtained some remarkable results by applying queuing theory to firewall performance evaluation. In 2011, he proposed a two-stage queuing service system with different service rates in each stage [35]. His findings served as guidelines for performance analysis modeling based on queuing theory. However, the core firewall rules were not introduced into the above-mentioned model. Later, Salah et al. proposed a multi-stage queuing service system with the same service rate across all stages except the first stage [36, 37]. Similarly, in 2014, Salah used an Erlangian service model to describe a multi-stage queuing service system with the same service rate across all stages [38]. The above-mentioned studies have applied queuing theory at the rule level, which is more in line with the actual operation of firewalls. In 2015, Zapechnikov et al. proposed an analytical model based on the Erlangian model to study the performance of queuing systems with finite queues and multiple service stages. In relation to modern application layer firewalls that cover a variety of applications during application layer filtering, they constructed the second service stage as a hyper-Erlangian queuing model [39].

In summary, the following issues have been raised by previous studies. First, models established on the basis of a single service layer lack a comprehensive representation of the system. Second, the service process in a single layer does not incorporate a rule engine; instead, it is treated as a single process. Third, some studies have assumed a single-service desk model. As current system hardware usually supports multi-core processors, this assumption is not realistic. Fourth, for convenience of deduction, the average value of the time parameter is used, while the randomness of probability events is overlooked. The present article addresses the aforementioned issues and establishes a rule-based multi-service-window, multi-layer model. In addition, system performance is analyzed from the perspective of resource allocation.

Model Analysis

In this study, we mainly discuss rule-based detection mode. A multi-service-desk, multi-layer model is combined with a rule-matching Erlangian model to establish an accurate description of the application layer firewall (ALF) model.

The ALF model is a multi-service-desk, three-layer queuing model whose service time follows the Erlang distribution. In the model, a data packet is first processed by the network and transport layers. Once the data packet arrives at the application layer, it can join different application layer queues depending on the previously processed results. The ALF model is shown in Fig 1.

The model parameters are defined as follows. The packet arrival rate of the system is denoted by λ. In the first layer, i.e., the network layer, Ka is the buffer queue capacity, Na is the number of service windows, ra is the number of rules, and μa is the service rate. In the second layer, i.e., the transport layer, Kb is the buffer queue capacity, Nb is the number of service windows, rb is the number of rules, and μb is the service rate. In the third layer, i.e., the application layer, K1, K2,…, Kn are the buffer queue capacities, N1, N2,…, Nn are the number of service windows, r1, r2,…, rn are the number of rules, and μ1, μ2,. . .. . ., μn are the service rates of application 1, 2, …, n, respectively. Further, q1, q2,…, qn are the probabilities that an arrived packet belongs to application 1, 2, …, n, respectively.

In terms of the basic multi-layer model, the ALF model further divides the service process of each layer into several continuous service stages. In the application layer, it corrects and improves the construction of multiple applications of the WEB-EG model. Therefore, parallel processing of all the service desks of different applications is achieved along with optimization of service desk utilization in the application layer.

Analysis of single layer

In the deduction process of the multi-layer model, we first deduct each of the three layers of the system. Then, the deductions are combined for the overall analysis. The modeling of various applications in the network, transport, and application layers is shown in Fig 2.

There are some processing differences between a multi-service-window Erlang queuing system and a single-service-desk M/Ek/1/K model. The multi-service-window model can be converted into equivalent single-service-desk models. In the system, there are N service desks servicing at the same time, each with service rate μ. Thus, the total service rate of the system is Nμ. The maximum capacity of the system is the sum of the buffer queue capacities and number of service windows, i.e., K+N. The M/G/1/K analytical method is used to analyze the obtained equivalent M/Ek/1/K model. The single-service-desk model assumes that data packets arrive according to a Poisson process with parameter λ. The buffer queue capacity is K + N-1, the number of rules is r, the service time has an Erlang distribution, and the service rate is Nμ. Therefore, the service time distribution density function is given by (1) Further, αk is the probability that k packets arrive at the system during the service time of a packet. Therefore, (2) Substituting (1) into (2) gives (3) From the gamma function formula, (4) Therefore, the following relationship is obtained: (5)

At the instant when a packet leaves, the number of packets in the system lies in the range [0, K + N-1]. At any other given time, the number of packets in the system lies in the range [0, K + N]. In the Markov process, the state transition probability Pjk denotes the probability of j number of packets changed to k number at any given time within the system. The state transition is related to the number of packets arriving within the service time. Therefore, the relationship between Pjk and αk is given by (6) (7) At the instant when a packet leaves, the system’s steady state probability is πk (0≤k≤K + N-1), and the following relationship exists between different states: (8) From (6), (7), and (8), it can be deduced that (9) Further, π0 is used in the following calculation: (10) In accordance with the regularity conditions, (11) From (10) and (11), the value of π0 can be obtained as (12)

Further, Pk denotes the probability that k data packets exist in the system at any given time, and Ploss denotes the packet loss rate, where packet loss occurs owing the arrival of packets at a full queue.

The system throughput, denoted by the packet departure rate, can be expressed as (13)

In addition, (14)

The following relationship can be obtained: (15) where denotes the offered load of the system. Finally, the packet loss rate can be deduced as follows: (16)

The average number of packets in the system is given by (17)

The average time spent by packets in the system is given by (18)

Finally, the average queuing time is obtained as (19)

In accordance with this method, deduction was carried out for each layer of the queuing system. The layers were combined to perform the overall analysis of the system.

Analysis of the first layer

In the first layer, the data packet arrival rate is the overall system arrival rate λ. The buffer capacity is Ka, the number of service windows is Na, the number of rules is ra, and the service rate is μa.

In this Erlangian service queuing model, the probability that k packets arrive at the queue during the service time of a packet is given by (20)

The probability of state transition in the Markov process is given by (21) (22) At the instant when a packet leaves, the system’s steady state probability is given by (23) Further, π0 is used in the following calculation: (24) The value of π0 is obtained under regularity conditions as (25) The offered load of the network layer is given by (26) The packet loss rate for this layer’s queuing system is obtained as (27) Therefore, the throughput of this layer is given by (28) The average queuing time of packets in this layer is given by (29)

Analysis of the second layer

In the second layer, the data packet arrival rate is the throughput γa of the first layer, i.e., the network layer. The buffer capacity is Kb, the number of service windows is Nb, the number of rules is rb, and the service rate is μb.

As with the analysis of the first layer, the probability of k packets arriving at the queue during the service time of a packet is given by (30) The probability of state transition in the Markov process is given by (31) (32) At the instant when a packet leaves, the system’s steady state probability is given by (33) Further, π0 is used in the following calculation: (34) The value of π0 is obtained under regularity conditions as (35) The offered load of the transport layer is given by (36) The packet loss rate for this layer’s queuing system is obtained as (37) Therefore, the throughput of this layer is given by (38) The average queuing time of packets in this layer is given by (39)

Analysis of the third layer

In the third layer, the data packet arrival rate is the throughput γb of the second layer, i.e., the transport layer. In the application layer, K1, K2,…, Kn are the buffer capacities, N1, N2,…, Nn are the number of service windows, r1, r2,…, rn are the number of rules, and μ1, μ2,…, μn are the service rates of application 1, 2, …, n, respectively. Further, q1, q2, …, qn are the probabilities that an arrived packet belongs to application 1, 2, …, n, respectively, while q1γb, q2γb, …, qnγb are the respective arrival rates of the packets.

For the queuing system that processes a packet belonging to application i, the probability that k data packets arrive at the queue during the service time is given by (40)

The relationship between the steady state probabilities is given by (41) The value of π0 is obtained under regularity conditions as (42) In the application layer, the offered load of the packet that enters application i is given by (43) The packet loss rate of this application in the application layer is obtained as (44) Thus, the throughput of data entering the application is given by (45) The average queuing time spent by the data packet entering application i in the application layer is given by (46)

For the entire queuing system, the total throughput is the data output rate of the last layer. Here, the total throughput is represented as the throughput of all the applications in the application layer, i.e., (47)

The packet loss rate of the next layer is the proportion of packets that have left the system owing to full buffer queues in the previous layer. Then, for a specific layer, the proportion of packets lost in the overall system can be obtained by multiplying the packet loss rate of the previous layer with that of the current layer. The average packet loss rate of the application layer is given by (48)

Therefore, the overall packet loss rate of the system is given by (49)

In the application layer, the average queuing time is given by (50)

Therefore, it is possible to obtain the average queuing time of packets from the network layer to the application layer as follows: (51)

Experimental Evaluation

This section describes a discrete event simulation method used to validate the ALF model. The basic principle is to use computer simulation to simulate discrete event systems.

In accordance with the performance evaluation model designed in this study, during the experimental procedure, event arrival was modeled as a Poisson process. The service model was designed as an Erlangian service process. Further, the experimental parameters were set to obtain the required results. Although the arrival time and service time of events were randomly generated, the time distribution was not even. Therefore, an exponential distribution was generated using Erlang-distributed random numbers.

In terms of the arrival time, the following expression should be used to obtain the exponentially distributed random numbers. (52) where rand0,1 is a uniformly distributed random number in the range (0,1), which is generated by the simulation process, Ti is the exponentially distributed random number required in the simulation process, and λ is the parameter of the exponential distribution in the model. The exponentially distributed random number was applied to the random generation of data packet arrival time intervals.

In terms of the Erlang-distributed random numbers, the generation method was similar to that used for exponentially distributed random numbers. For the kth stage of the Erlang distribution, the expression for generating the random value of the service time is given by (53) where it is necessary to continuously generate k random values for k service stages, Ts is the random value of the Erlang-distributed total service time, and μ is the parameter of the Erlang distribution in the kth stage, i.e., the service time of each stage is subjected to a negative exponential distribution with parameter μ. The Erlang-distributed random numbers were applied to the rule-based service matching process to obtain the total service time.

The performance of the system model was evaluated under different conditions of CPU resource allocation. It was necessary to list all the different resource allocation combinations given the total resources available, which were then input to the theoretical formula and simulation program for the calculation of throughput.

Experiment 1

There were 6 service desks and 2 applications. The probabilities that a data packet belonged to application layer 1 and application layer 2 were q1 = 50% and q2 = 50%, respectively. The packet arrival rate was λ = 200 kpps (1000 packets per second). The processing rates of the network layer, transport layer, and two application layers were μa = 250 kpps, μb = 333 kpps, μ1 = 145 kpps, and μ2 = 180 kpps, respectively. The buffer capacities of the network layer, transport layer, and two application layers were Ka = 100, Kb = 50, and K1 = 100, and K2 = 50, respectively. The number of rules for the network layer, transport layer, and two application layers were ra = 5, rb = 5, r1 = 5, and r2 = 5, respectively. The test results are listed in Table 1.

The experimental results showed that the value of the throughput was maximized when resource allocation was specified as Na = 2, Nb = 1, N1 = 2, and N2 = 1. These results were consistent with the theoretical results.

Experiment 2

There were 5 service desks and 2 applications. The probabilities that a data packet belonged to application layer 1 and application layer 2 were q1 = 50% and q2 = 50%, respectively. The packet arrival rate was λ = 150 kpps (1000 packets per second). The processing rates of the network layer, transport layer, and two application layers were μa = 500 kpps, μb = 250 kpps, μ1 = 333 kpps, ands μ2 = 500 kpps, respectively. The buffer capacities of the network layer, transport layer, and two application layers were Ka = 100, Kb = 100, K1 = 10, and K2 = 10, respectively. The number of rules for the network layer, transport layer, and two application layers were ra = 5, rb = 3, r1 = 5, and r2 = 5, respectively. The test results are listed in Table 2.

The experimental results showed that the value of the throughput was maximized when the resource allocation was specified as Na = 1, Nb = 2, N1 = 1, and N2 = 1. These results were consistent with the theoretical results.

Conclusion

On the basis of previous studies, the present article established a complex performance evaluation model for application firewalls that is based on an Erlangian multi-service-desk model with three service layers, namely the ALF model. Theoretical analysis and deductions were carried out using this model. We derived the theoretical throughput, packet loss ratio, and average delay. We started from the basic model constituting the overall system and demonstrated the deduction process for a single-layer queuing system based on an Erlang multi-service-desk model with mixed layers. Then, the overall system analysis was carried out to account for the ALF’s multi-layer structure and the different types of applications in the application layer. System performance indicators, such as packet loss rate, throughput, and average queue time, were obtained. Finally, experimental evaluations were carried out to compare the theoretical and experimental values of the performance indicators under different resource allocation schemes for the ALF model. During the model establishment and analysis process, multi-service-desk allocation scenarios were fully considered. Thus, the number of service desks in each layer was involved in the calculation of each performance indicator. The experimental results showed that the allocation of CPU resources can directly influence the overall performance of application layer firewall systems. Moreover, a reasonable allocation of resources can effectively improve the performance of application layer firewall. Therefore, this model can be used as a reference for the design of application layer firewall. In the future, we will extend our work to include the analysis of the user behavior, throttling the number of connections, and DDoS detection.

Acknowledgments

This work was funded by the Fundamental Research Funds for the Central Universities (HEUCF160605). The authors wish to thank the editor and anonymous reviewers for their valuable comments and feedback, which helped to improve this article.

Author Contributions

  1. Conceptualization: SX WY.
  2. Formal analysis: HD.
  3. Investigation: HD SX.
  4. Methodology: SX HD.
  5. Resources: SX WY.
  6. Software: HD.
  7. Validation: HD JZ.
  8. Visualization: SX JZ.
  9. Writing – original draft: HD JZ.
  10. Writing – review & editing: SX WY.

References

  1. 1. Choo K-KR. The cyber threat landscape: Challenges and future research directions. Computers & Security. 2011;30(8): 719–731.
  2. 2. Prokhorenko V, Choo K-KR, Ashman H. Web application protection techniques: A taxonomy. J Netw Comput Appl. 2016;60: 95–112.
  3. 3. Prokhorenko V, Choo K-KR, Ashman H. Intent-based Extensible Real-time PHP Supervision Framework. 2013.
  4. 4. Prokhorenko V, Choo K-KR, Ashman H. Context-oriented web application protection model. Appl Math Comput. 2016;285: 59–78.
  5. 5. Peng J, Choo K-KR, Ashman H. Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles. J Netw Comput Appl. 2016.
  6. 6. Peng J, Choo K-KR, Ashman H. User profiling in intrusion detection: A review. J Netw Comput Appl. 2016;72: 14–27.
  7. 7. Peng J, Choo K-KR, Ashman H. Astroturfing detection in social media: Using binary n-gram analysis for authorship attribution. IEEE Trustcom/BigDataSE/ISPA; 2016. Forthcoming.
  8. 8. Peng J, Detchon S, Choo K-KR, Ashman H. Astroturfing detection in social media: a binary n-gram-based approach. 2016. Forthcoming.
  9. 9. Osanaiye O, Choo K-KR, Dlodlo M. Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J Netw Comput Appl. 2016;67: 147–165.
  10. 10. Osanaiye O, Cai H, Choo K-KR, Dehghantanha A, Xu Z, Dlodlo M. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP J Wirel Commun Netw. 2016;2016(1): 1.
  11. 11. Mayer A, Wool A, Ziskind E, editors. Fang: A firewall analysis engine. Security and Privacy, 2000 S&P 2000 Proceedings 2000 IEEE Symposium on; 2000: IEEE.
  12. 12. Qian J, Hinrichs S, Nahrstedt K. ACLA: A framework for access control list (ACL) analysis and optimization. Communications and Multimedia Security Issues of the New Century: Springer; 2001; 197–211.
  13. 13. Al-Shaer ES, Hamed HH. Modeling and management of firewall policies. IEEE Transactions on Network and Service Management. 2004;1(1): 2–10.
  14. 14. Al-Shaer E, Hamed H, Boutaba R, Hasan M. Conflict classification and analysis of distributed firewall policies. IEEE J Sel Area Comm. 2005;23(10): 2069–84.
  15. 15. Gouda MG, Liu AX. Structured firewall design. Comput Netw. 2007;51(4): 1106–20.
  16. 16. Hamed HH, El-Atawy A, Al-Shaer E, editors. Adaptive Statistical Optimization Techniques for Firewall Packet Filtering. INFOCOM; 2006: Citeseer.
  17. 17. Yuan L, Chen H, Mai J, Chuah C-N, Su Z, Mohapatra P, editors. Fireman: A toolkit for firewall modeling and analysis. 2006 IEEE Symposium on Security and Privacy (S&P'06); 2006: IEEE.
  18. 18. El-Atawy A, Samak T, Al-Shaer E, Li H, editors. Using online traffic statistical matching for optimizing packet filtering performance. IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications; 2007: IEEE.
  19. 19. Liu AX, Gouda MG. Diverse firewall design. IEEE Trans Parallel Distrib Syst. 2008;19(9): 1237–1251.
  20. 20. Misherghi G, Yuan L, Su Z, Chuah C-N, Chen H. A general framework for benchmarking firewall optimization techniques. IEEE Transactions on Network and Service Management. 2008;5(4): 227–238.
  21. 21. Leffler SJ. The design and implementation of the 4.3 BSD UNIX operating system. Reading: Addison Wesley, 1989. 1989;1.
  22. 22. Bovet DP, Cesati M. Understanding the Linux kernel: " O'Reilly Media, Inc."; 2005.
  23. 23. Kleinrock L. Queueing systems, volume I: theory. 1975.
  24. 24. Jain R. The art of computer systems performance analysis: techniques for experimental design, measurement, simulation, and modeling: John Wiley & Sons; 1990.
  25. 25. Takagi H. Queueing Analysis, Vol. 1: Vacation and Priority Systems. NorthHolland, Amsterdam. 1991.
  26. 26. Gross D. Fundamentals of queueing theory: John Wiley & Sons; 2008.
  27. 27. Kikuchi S, Matsumoto Y, editors. Performance modeling of concurrent live migration operations in cloud computing systems using prism probabilistic model checker. Cloud Computing (CLOUD), 2011 IEEE International Conference on; 2011: IEEE.
  28. 28. Xiong K, Perros H, editors. Service performance and analysis in cloud computing. 2009 Congress on Services-I; 2009: IEEE.
  29. 29. Firdhous M, Ghazali O, Hassan S, editors. Modeling of cloud system using Erlang formulas. The 17th Asia Pacific Conference on Communications; 2011: IEEE.
  30. 30. Salah K, Boutaba R, editors. Estimating service response time for elastic cloud applications. 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET); 2012: IEEE.
  31. 31. Salah K, editor A Queueing Model to Achieve Proper Elasticity for Cloud Cluster Jobs. IEEE CLOUD; 2013.
  32. 32. Salah K, Calero JMA, editors. Achieving elasticity for cloud MapReduce jobs. Cloud Networking (CloudNet), 2013 IEEE 2nd International Conference on; 2013: IEEE.
  33. 33. Yang B, Tan F, Dai YS. Performance evaluation of cloud service considering fault recovery. J Supercomput. 2013;65(1): 426–444.
  34. 34. Khazaei H, Misic J, Misic VB. Performance Analysis of Cloud Computing Centers Using M/G/m/m+r Queuing Systems. IEEE Trans Parallel Distrib Syst. 2012;23(5):936–943.
  35. 35. Salah K. Analysis of a two-stage network server. Appl Math Comput. 2011;217(23): 9635–9645.
  36. 36. Salah K, editor Queuing analysis of network firewalls. Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE.
  37. 37. Salah K, Elbadawi K, Boutaba R. Performance Modeling and Analysis of Network Firewalls. IEEE Transactions on Network & Service Management. 2012;9(1):12–21.
  38. 38. Salah K. Analysis of Erlangian network services. Int J Electron Commun. 2014;68(7):623–630.
  39. 39. Zapechnikov S, Miloslavskaya N, Tolstoy A, editors. Modeling of next-generation firewalls as queueing services. Proceedings of the 8th International Conference on Security of Information and Networks; 2015: ACM.