0% found this document useful (0 votes)
6 views72 pages

Heuistic

The document presents a project titled 'A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization,' which focuses on optimizing firewall policies across different administrative domains while preserving privacy. It introduces a protocol that allows two adjacent firewalls to cooperate in identifying removable rules without disclosing their policies, achieving low communication costs and minimal processing overhead. Additionally, the document outlines the system environment, including hardware and software requirements, and provides an overview of ASP.NET as the development framework used in the project.

Uploaded by

cammusowmiya13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views72 pages

Heuistic

The document presents a project titled 'A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization,' which focuses on optimizing firewall policies across different administrative domains while preserving privacy. It introduces a protocol that allows two adjacent firewalls to cooperate in identifying removable rules without disclosing their policies, achieving low communication costs and minimal processing overhead. Additionally, the document outlines the system environment, including hardware and software requirements, and provides an overview of ASP.NET as the development framework used in the project.

Uploaded by

cammusowmiya13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 72

A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

1.INTRODUCTION
1.1SYNOPSIS

This project is entitled as “A Heuristic Approach For Privacy Preserving Protocol


For Cooperative Firewall Optimization” using ASP.NET as frontend and MYSQL as
backend. Firewalls have been widely deployed on the Internet for securing private networks. A
firewall checks each incoming or outgoing packet to decide whether to accept or discard the
packet based on its policy. Optimizing firewall policies is crucial for improving network
performance.Prior work on firewall optimization focuses on either intra-firewall or inter-firewall
optimization within one administrative domain where the privacy of firewall policies is not a
concern. This paper explores inter firewall optimization across administrative domains for the
first time.The key technical challenge is that firewall policies cannot be shared across domains
because a firewall policy contains confidential information and even potential security holes,
which can be exploited by attackers. The system proposes the first cross-domain privacy-
preserving cooperative firewall policy optimization protocol. Specifically, for any two adjacent
firewalls belonging to two different administrative domains, our protocol can identify in each
firewall the rules that can be removed because of the other firewall.The optimization process
involves cooperative computation between the two firewalls without any party disclosing its
policy to the other. The communication cost is less than a few hundred KBs. Our protocol
incurs no extra online packet processing overhead and the offline processing time is less than a
few hundred seconds.

In our case, we have overlapping dimensional hyper-rectangles, since firewall rules can,
and often do, overlap each other making rules overlap is the method firewall administrators use
to implement intersection and difference operations on sets of IP addresses or port
numbers.These overlapping hyper-rectangles can be decomposed into non-overlapping hyper-
rectangles however, a moment’s reflection shows that the number of resulting non- overlapping
hyper-rectangles is (nd) , thus the worst case complexity for firewall rules is no better than that
of GEM.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

2.ORGANIZATION PROFILE

ABOUT US

Pixel Techz is leading software development and offshore outsourcing company primarily focus on
software product development, website designing resource management and handles the cutting-edge
technology for several clients around the world. Pixel Techz applies innovative strategy that converts
the students MNCs dreams jobs comes to reality by taking this important training program that going
to make huge positive impact in their life. We are also pioneers in the technical training programs in
the following areas: Computer Networking, J2ME Android Developer, Cloud Computing,
Microsoft.Net Developer, Oracle Developer, custom software and application development,
outsourced product development and database programming. We have strong and well-trained team
of trainers with proven track record at national and international level and conducted more than 200
training programs in various colleges and universities. Pixel Techz blends deep technical capabilities
with a strong service orientation and process focus to offer a compelling value proposition to its
clients. Pixel Techz is a values-driven, highenergy organization with a fast-growing team of top-
notch professionals. By leveraging the onsite - offshore model, we provide speedy and affordable
solutions that allow us to stretch web IT budgets. Pixel Techz is managed by a team of professional
drawn from globally reputed companies. Pixel Techz has an outstanding track record of service
delivery. Our Proven domain expertise across verticals, processes, project management
methodologies, rapid time-to-market and cost savings (up to 40%) have earned us satisfied
customers. Today, Pixel Techz stands as an obvious choice for software services companies who
want to harness the dual power of outsourcing and off shoring. In the advent of economic
development in India, Pixel Techz in the process of associating themselves with STPI, QAI
institutions – to spearhead their expertise and experience gained in Indian horizon.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

3. SYSTEM ENVIRONMENT

3.1SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS

Hard disk : 100GB

RAM : 2GB

Processor : Dual Core

Monitor : 17’’Color Monitor

Keyboard : 104 Keys Multimedia Keyboard

Mouse : Logitech Optical Mouse

SOFTWARE REQUIREMENTS

Front End : ASP.Net

Back End : SQL Server

Coding : C#

Operating System : Windows XP professional

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

3.2. ABOUT WINDOWS 10


Windows 10 is a series of personal computer operating systems produced by Microsoft as
part of its Windows NT family of operating systems. It is the successor to
Windows 8.1, and was released to manufacturing on July 15, 2015, and broadly
released for retail sale on July 29, 2015. Windows 10 receives new builds on an ongoing
basis, which are available at no additional cost to users. Mainstream builds of Windows
10 are labeled version YYMM with YY representing the year and MM representing the
month of release. For example, Version 1809 for September 2018. There are additional
test builds of Windows 10 available to Windows Insiders. Devices in enterprise
environments can receive these updates at a slower pace, or use long-term support
milestones that only receive critical updates, such as security patches, over their ten-year
lifespan of extended support.

One of Windows 10's most notable features is support for universal apps, an
expansion of the Metro-style apps first introduced in Windows 8. The Windows user
interface was revised to handle transitions between a mouse-oriented interface and a
touchscreen-optimized interface based on available input devices particularly on 2-in-1
PCs, both interfaces include an updated Start menu which incorporates elements of
Windows 7's traditional Start menu with the tiles of Windows 8. Windows 10 also
introduced the Microsoft Edge web browser, a virtual desktop system, a window and
desktop management feature called Task View, support for fingerprint and face
recognition login, new security features for enterprise environments, and DirectX 12.

Windows 10 received mostly positive reviews upon its original release in July 2015.
Critics praised Microsoft's decision to provide a desktop-oriented interface in line with
previous versions of Windows, contrasting the tablet-oriented approach of 8, although
Windows 10's touch-oriented user interface mode was criticized for containing
regressions upon the touch- oriented interface of Windows 8. Critics also praised the
improvements to Windows 10's bundled software over Windows 8.1, Live integration,
as well as the functionality and capabilities of the personal assistant and the replacement
of Internet Explorer with Microsoft Edge. However, media outlets have been critical of

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

changes to operating system behaviors, including mandatory update installation,


privacy concerns over data collection performed by the OS for

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Microsoft and its partners and the adware-like tactics used to promote the operating system on its
release.

Microsoft aimed to have Windows 10 installed on at least one billion devices in the two to three
years following its release. Up to August 2016, Windows 10 usage was increasing, with it
then plateauing, while eventually in 2018, it became more popular than Windows 7 (though that
is still more used in most countries in Asia and Africa) and thus the single most used Windows
version overall (at 48.18%, thus the other more used overall),[19] though not on some continents
as measured by web traffic. As of September 2018, the operating system is running on more than
700 million devices and has an estimated usage share of 32% on traditional PCs and 15% across
all platforms (PC, mobile, tablet, and console).

HARDWARE RECOMMENDATIONS

Windows 10 provides a terrific experience on the same hardware that runs Windows 10. Table 1-
1 describes the hardware recommendations for Windows 8. In fact, it might even notice that PCs
seem to work even better after upgrading from Windows 7 to Windows 10.

Additionally, some Windows 8 features require other hardware components:

 To use touch, it needs a tablet or a monitor that supports multi-touch.


 To access the Windows Store to download and run apps, it needs an active Internet
connection and a screen resolution of at least 1024 x 768.
 To snap apps, it needs a screen resolution of at least 1366 x 768.

SENSORS AND SECURITY

 Low-power Bluetooth

 GPS
 Gyroscopes

It will also be able to take advantage of security hardware technologies like Trusted
Platform Module (TPM) and Unified Extensible Firmware Interface (UEFI) boot.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

FILE EXPLORER

File Explorer is the new Windows Explorer. File Explorer has quite a history, going all
the way back to the days of MS-DOS. Over the years, the tool now known as File Explorer has
evolved. It used to be called File Manager, and for a long time it was called Windows Explorer.
With the release of Windows 8, Windows Explorer is now known as File Explorer.
TASK MANAGER

With the new Task Manager, it can quickly see running programs and can also end tasks
if there is an issue. But IT pros and power users frequently want to see more information about
the running tasks and the overall status of the system. By clicking More Details, it sees a
significant amount of information about the processes running on either PC, its performance.
Merely looking at the available tabs reveals that there is a lot of information and many options
here. Like File Explorer, the Task Manager interface has been redesigned to serve the needs of
all types of users.
PROFILE CUSTOMIZATION

Profile customization in Windows 8 is simple. Both roaming and local profiles are available in
Windows 8. Roaming profiles allow user customizations to be saved remotely and accessed on
any Windows 8 machine. Local profiles are stored locally on the file system volume just like
those in previous versions of Windows. To manage the user experience for generating local
profiles, Sipper is available in Windows 8. Default customizations can be packaged, just like in
Windows 7, and redeployed in the out-of-box experience (OOBE) after system imaging is
performed.

NETWORKING ENHANCEMENTS

Windows 8 and Windows Server 2012 provides new features and resources when
deployed together. Many new features that IT pros love about Windows Server 2012 are
optimized for use with Windows 8 clients. In fact, many of the new improved management
features in Windows Server 2012 can also be used from a local console only available in

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Windows 8. Many redesigned features were available in Windows Server 2008 but have been
imagined for the modern, expanding business needs.
SECURITY
Microsoft Windows 8 builds on the security features of Windows 7. It enables the
enterprise to provide a secure and a stable computing platform from which users can accomplish
their tasks. Three primary areas are the focus of the Microsoft security approach. Those areas
include the following:
 Protect the client against threats.
 Protect sensitive data
 Secure access to resources.
To help protect a client against threats, Windows 8 offers several enhancements such as
Trusted Boot, Internet Explorer SmartScreen Application Reputation, and app sandboxing. The
changes made to Bit Locker in Windows 8 highlights the efforts to protect sensitive data. It
Secure access to resource centers on Virtual Smart cards and Dynamic Access Control.
COMMAND LINE

Windows Console windows (for both PowerShell and the legacy Command Prompt) can
now be resized without any restrictions, can be made to cover the full screen by pressing Alt +

Enter , and can use standard keyboard shortcuts, such as those for cut, copy, and paste. Other

features such as word wrap and transparency were also added. These functions can be disabled to
revert to the legacy console if needed.

The Anniversary Update added Windows Subsystem for Linux (WSL), which allows the
installation of a user space environment from a supported Linux distribution that runs natively on
Windows. The subsystem translates Linux system calls to those of the Windows NT kernel (only
claims full system call compatibility as of WSL 2, included in a later Windows update). The
environment can execute the Bash shell and 64-bit command-line programs. Windows
applications cannot be executed from the Linux environment, and vice versa. Linux distributions
for Windows Subsystem for Linux are obtained through Microsoft Store. The feature initially
supported an Ubuntu-based environment; Microsoft announced in May 2017 that it would

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

add Fedora and OpenSUSE environment options as well.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

3.3 ABOUT ASP.NET

The .NET framework includes tools that ease the creation of web services. ASP.NET
is the latest offering from Microsoft toward the creation of a new paradigm for server-side
scripting. We will see the basics of ASP.NET, which provides a complete framework for the
development of web applications. Here we get introduced into ASP.NET, the platform
requirements for ASP.NET applications, and the ASP.NET architecture. In addition, we get
introduced to web forms of ASP.NET applications, a new addition to ASP.NET.

ASP .NET differs in some ways from earlier versions OS ASP. ASP.NET has new
features such as better language support, a new set of controls, XML-based components, and
more secure user authentication. ASP.NET also provides increased performance by executing
ASP code.

Usually a software product undergoes many evolutionary phases. In each release


version of the software product, the software vendor fixes the bugs form previous versions
and adds new features. ASP 1.0 was released in 1996. Since then, two more versions of ASP
(2.0 AND 3.0) have been released. In various versions of ASP, new features have been
added. However, the basic methodology used for creating applications has not changed.

ASP.NET provides a unique approach toward web application development, so one


might say that ASP.NET has started a new revolution in the world of web application
development. ASP.NET is based on the Microsoft.NET framework. The .NET framework is
based on the common language runtime (CLR). Therefore, it imparts all of the CLR benefits
to ASP.NET applications. These CLR benefits include automatic memory management,
support for multiple languages, secure user authentication, and ease in configuration, and
ease in deployment.

BENEFITS OF ASP.NET
Applications used to perform server-side processing, but this has two major
drawbacks. First, scripting language is interpreted and not complied. Therefore, the errors can
only be checked at runtime. This affects the performance of web applications. Second,
scripting language is not strongly typed. The scripting languages do not have a built –in set of
predefined data types. This requires developers to cast the existing objects of the language to
their expected data type. Thus, these objects can be validated only at runtime. This validation

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

leads to a low performance of web applications. ASP.NET continues to support scripting


languages, but it supports complete Visual Basic for server-side programming ASP.NET also
provides support for c# (pronounced c sharp) and C++.

CROSS – LANGUAGE DEVELOPMENT

ASP.NET provides flexibility to extend created in one language to another language.


For example, if we have an object in C++, ASP.NET enables us to extend this object in
Visual Basic.

ASP.NET PAGE SYNTAX

DIRECTIVES
<% @ page language =”VB” […] %>

Code Declaration Blocks


<script run at=”server” […]>

[ lines of code ]

</script>

CODE RENDER BLOCKS

<%

[inline code or expressions]

%>

HTML Control Syntax

<HTML element runat=”server” [attribute(s)]>

</HTML element>

CUSTOM CONTROL SYNTAX

CUSTOM SERVER CONTROLS

<ASP: Textbox id=”My Tbi” run at=”server”>


Sir Issac Newton College of Arts and Science
A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

SERVER CONTROL PROPERTY


<ASP: Textbox maxlength=”80” run at=”server”>

SUB PROPERTY

<ASP: Label font-size=”14” run at=”server”>

SERVER CONTROL EVEN BINDING

<ASP: Button On Click=”My Click” run at=”server”>

DATA BINDING EXPRESSION


< ASP: label

Text=’<%# data binding expression %>’

Run at =”server”/>

SERVER-SIDE OBJECTS TAGS


<object id=”id” run at=”server”

Identifier=”id Name”/>

SERVER-SIDE INCLUDE DIRECTIVES


<!-#include path type=filename -->

SERVER-SIDE COMMENTS

%-- comment block -- %>

An application in ASP.NET consists of files, pages, modules, and executable code that
reside in one virtual directory and its subdirectories. Application state is stored in global
variables for a given ASP.NET application. For that Reason developers have to follow some
implements rules .Variables for storing application state occupy system resources. A global
variable has to be locked and unlocked to prevent problems with concurrent access.

WEB FORMS SERVER CONTROLS

The term server controls always means Web Forms server controls, because they are
specially designed to work with Web Forms.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

SERVER CONTROL FAMILIES

Web Forms provide different server control families

 HTML server controls


 ASP.NET server controls
 Validation controls
 User controls
 Mobile controls

DATA BINDING
We can bind Web Forms control properties to any data in a data store. This so-called
data binding gives us nearly complete control over how data moves to the page and back
again to the data store.

PAGE CLASS

When a page is loaded, the ASP.NET runtime generates and instantiates a page class.
This object forms a collection of our separate components (like visual elements and business
logic). So all (visual and code) elements are accessible through this object.

HTML SERVER CONTROL

We can convert simple HTML elements to HTML server controls, let the ASP.NET
engine create an instance on the server, and now they are programmable on the server. The
conversion is done by simply adding attributes to the HTML tag. The attributes runat=server
informs the framework to create a server-side instance of the control. If we additionally
assign an ID, we can reference the control in our code.

For example, we can use the HTML Anchor control to program against the HTML
<a> tag to dynamically generate the H Ref values, or use Html Table (HTML <table>) to
dynamically create tables and their content.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

ASP.NET SERVER CONTROLS

ASP.NET server controls are abstract controls. There is no one-to-one mapping to


HTML server controls. But ASP.NET comes with a rich set of controls.

Another feature is the typed object model. This gives us the potential for type-safe
programming. Server controls can automatically detect what browser we are using and
generate the proper version of HTML output.

BUTTON
This is way to enable the user to finish editing a form. A Button enforces the
submitting of the page, and we can additionally raise events like the Click event.

TEXTBOX
A Textbox is an input box where the user can enter information like numbers, text, or
dates formatted as single line, multilane, or password. This control raises a Text Changed
event when the focus “leaves” the control.

VALIDATION CONTROLS
Another group of server controls are validation controls. These can be used to check
the user’s entries. Validation can be processed on the client and on the server. Validation on
the client side can be performed using a client script. In that case, the user will be confronted
with immediate feedback-without a round trip to the server.

Server-side validation in addition provides, for example, security against users


bypassing client-side validation.

ASP.NET PROVIDES THE FOLLOWING TYPES OF VALIDATION

Required entry- the field must be filled in by the user. Comparison to a value- the
entered value is checked against another value of another field, a database, or a constant
value by using comparison operators. Range checking – the user’s entry is checked to see
whether it resides between given boundaries. Pattern matching- a regular expression is
defined that the entered value must match. User’s defined- implement our own validation
logic. When the validation fails, an error message is generated and sent back to the client

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

browser. This can be done in several ways. For example, all error messages related to a
specific transaction could be collected and presented to the user in summary.

C#
Microsoft C# (pronounced C sharp) is a new programming language designed for
building a wide range of enterprise applications that run on the .NET Framework. An
evolution of Microsoft C and Microsoft C++, C# is simple, modern, type safe, and object
oriented. C# code is compiled as managed code, which means it benefits from the services of
the common language runtime. These services include language interoperability, garbage
collection, enhanced security, and improved versioning support.

C# is introduced as Visual C# in the Visual Studio .NET suite. Support for Visual
C# includes project templates, designers, property pages, code wizards, an object model, and
other features of the development environment. The library for Visual C# programming is the
.NET Framework.

C# is a simple, modern, object-oriented, and type safe programming language. C#


has its roots in the C family of languages and will be immediately familiar to C, C++, and
Java programmers. C# is standardized by ECMA International as the ECMA-334 standard
and by ISO/IEC as the ISO/IEC 23270 standard. Microsoft’s C# compiler for the .NET
Framework is a conforming implementation of both of these standards. C# aims to combine
the high productivity of Visual Basic and the raw power of C++.

Visual C#.NET is Microsoft’s C# development tool. It includes an interactive


development environment, visual designers for building Windows and Web applications, a
compiler, and a debugger. Visual C#.NET is part of suite of products, called Visual
Studio.NET, that also includes Visual Basic.NET, Visual C++.NET, and the Jscript scripting
language. All of these languages provide access to the Microsoft .NET Framework, which
includes a common execution engine and a rich class library.The .NET Framework defines a
“Common language Specification” (CLS), a sort of lingua franca that ensures seamless
interoperability between CLS compliant languages and class libraries. For C# developers, this
means that even though C# is a new language, it has complete access to the same rich class
libraries that are used by seasoned tools such as Visual Basic .NET and Visual C++.NET. C#
itself does not include a class library.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

C# is an object-oriented language, but C# further includes support for component-


oriented programming. Contemporary software design increasingly relies on software
components in the form of self-contained and self-describing packages of functionality. Key
to such components is that they present a programming model with properties, methods and
events; they have attributes that provide declarative information about the component; and
they incorporate their own documentation. C# provides language constructs to directly
support these concepts, making C# a very natural language in which to create and use
software components.

Several C# features aid in the construction of robust and durable applications:


Garbage collection automatically reclaims memory occupied by unused objects; exception
handling provides a structured and extensible approach to error detection and recovery; and
the type-safe design of the language makes it impossible to have uninitialized variables, to
index arrays beyond their bounds, or to perform unchecked type casts.

C# has a unified type system. All C# types, including primitive types such as int and
double, inherit from a single root object type, thus, all types share a set of common
operations, and values of any type can be stored, transported, and operated upon in a
consistent manner. Furthermore, C# supports both user-defined reference types and value
types, allowing dynamic allocation of objects as well as in-line storage of lightweight
structures.

To ensure that C# programs and libraries can evolve over time in a compatible
manner, much emphasis has been placed on versioning in C#’s design. Many programming
languages pay little attention to this issue, and, as a result, programs written in those
languages break more often than necessary when newer versions of dependent libraries are
introduced. Aspects of C# ’s design that were directly influenced by versioning
considerations include the separate virtual and override modifiers, the rules for method
overload resolution, and support for explicit interface member declarations.

C# 2.0 introduces several language extensions, including Generics, Anonymous


Methods, Iterators, Partial Types, and Null able Types.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

 Generics permit classes, structures, interfaces, delegates, and methods to be


parameterized by the types of data they store and manipulate. Generics are

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

useful because they provide stronger compile-time type checking, require


fewer explicit conversions between data types, and reduce the need for
boxing operations and run-time type checks.
 Anonymous methods allow code blocks to be written “in-line” where
delegate values are expected. Anonymous methods are similar to lambda
functions in the Lisp programming language. C# 2.0 supports the creation of
“closures” where anonymous methods access surrounding local variables
and parameters.
 Iterators are methods that incrementally compute and yield a sequence of
values. Iterators make it easy for a type to specify how for each statement
will iterate over its elements.
 Partial types allow classes, structures, and interfaces to be broken into
multiple pieces stored in different source files for easier development and
maintenance. Additionally, partial types allow separation of machine-
generated and user- written parts of types so that it is easier to augment code
generated by a tool.
 Null able types represent values that possibly are unknown. A null able type
supports all values of its underlying type plus an additional null state. Any
value type can be the underlying type of a null able type.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

3.4 ABOUT DBMS AND RDBMS


A database is a collection of related tables and a set of program to manipulate the data. Because it
is an entire system that enables one to add, store and manage data called database management
system.
DATA
A data is a collection of facts in row from that become information after proper organization or
processing is known as data.
DATABASE
A database is a collection of data, which are arranged into a single integrated file system, which
helps in minimizing duplication of data and provides convenient access to information within that
system.
TYPES OF DBMS
There are three types of data base system models
➢ Network model
➢ Hierarchical model
➢ Relational model
ADVANTAGES
Can model too many relationships
➢ It is flexible in representing relationships
➢ Database revision and restructuring
➢ Database integrity control
➢ Performance monitoring
CODD’S Rules are designed in such way that when the database is ready to use it encapsulates the
relational theory to its full potential. There are twelve rules that are listed below.
THE INFORMATION RULE
All information is explicitly and logically represented in tables as values. The rule of Guaranteed
Access Every item of a data must be logically addressable with the help of table name primary key

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

value and column name.


THE SYSTEMATIC TREATMENT OF NULLVALUES
The RDBMS must be able to support null (these values are different form zeros and spaces) to
represent missing or inapplicable information.

THE DATABASE DESCRIPTION RULE


A description of a database is maintained using the same logical structures with which data was
define by the RDMS. These are accessible to users with appropriate authority and are store in the
data dictionary.
COMPREHENSIVE DATA LANGUAGE
According to this rule, the system must support the following
➢ Data definition
➢ View definition
➢ Data manipulation
➢ Integrity constraints
➢ Authorization
➢ Transaction management operations
THE VIEW UPDATING RULE
All views that are theoretically updatable must also be updatable by the system.
INSERT AND UPDATE RULE
A single operand must bold good for all retrieval, update, delete and insert activities. This rule
implies that all the data manipulation commands must be operational on sets of row having a relation
on single row.
THE PHYSICAL INDEPENDENCE RULE
Application programs must remain unimpaired when any changes are made in storage representation
or across method.

THE LOGICAL DATA INDEPENDENCE RULE

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

The changes that are made should not affect the user’s ability to work with the data. The changes can
be splitting the table into many more tables.
THE INTEGRITY INDEPENDENCE RULE
The integrity constraints should be stored in the system catalogue are in the database as a table. THE
NON SUBVERSION RULE--The non-subversion rule states that different levels of the language
cannot subvert or by pass the integrity rules and constraints. To put it simple words, if RDBMS
supports a lower level language then it should not by pass integrity constraints defined in the higher
level.
BENEFITS OF DBMS
➢ Minimal redundancy
➢ Data consistency
➢ Data sharing
➢ Data integrity
➢ Privacy and security
➢ Data independence
MINIMAL REDUNDANCY
Redundant data are space expensive. They required more than one updating operation, further as
different copies of data may be indifferent storage of updating; this system may not give consistent
information. Hence a database system can be used to eliminate redundancy whenever possible.
DATA CONSISTENCY
When changing occurred in a data item, every file, which contains that field, should be updated to
reflect the change. Database system can be used to eliminate redundancy whenever possible.
DATA SHARING
A control database can be located on a server, which can be shared by several users. In fact, a
database can be shared by several users. This sharing enables central storage of the database.
DATA INTEGRITY
When many users put in the database it is very important that the data item and association between
data-items are not destroyed. Integrity checks can be performed at the data level itself, by checking
that data values confirm to certain specified rules.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

PRIVACY AND SECURITY


Privacy means that individuals and corporation as a whole should have a due right to determine them
when how and to what extent information about them is to the transmitted to others. Security of data
means protecting data against accidental intentional description. DATA INDEPENDENCE It is the
property of changing the physical structure of data without changing the logical structure. This
means there is no need for changing the program to accommodate the data format changes.
RELATIONAL DATABASE MANMAGEMENT SYSTEM (RDBMS)
A database employing relational structure consists of tables. In each table the row represent all the
attributes. Database can be that of collection of tables. Relationship can be represented by column
data values in different relation. RDBMS is a one among the three basic models of DBMS. In the
relational database, a relation is just in a two-dimensional table in which the entities in the table are
unique. Each column has distinct name. The order of row is immaterial and row is distinct. Each row
of the table is called as “Tuple”. Each column of the table is technically called “Attributes”. A
domain is a pool of value from which the values for a given column must be chosen. A primary key
of a relation is the attributes that uniquely a given “Tuple”. Multi cloud security for stored data based
on SQL range queries.
PRIMARY KEY
A primary key is an attribute which determines all other attributes within the row. Each data in a row
is functionally depending upon the primary key. A primary key can be combination of attributes is
known as composite key.
FOREIGN KEY
A foreign key is an attribute in one table but is the primary in another table. The foreign key is
reference to a tuple of a table from which it is taken.
PROPERTIES
➢ Each entry in a table represents on data item.
➢ Each column is assigned a distinct name.
➢ All rows are distinct; no duplicate rows are allowed.
➢ Both columns can be viewed in any sequence.
We can use these tools to

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

➢ Define a database.

3.5 ABOUT MYSQL


MySQL is an open source relational database management system (RDBMS) based on

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Structured Query Language (SQL). MySQL runs on virtually all platforms, including Linux, UNIX
and Windows. Although it can be used in a wide range of applications, MySQL is most often
associated with web-based applications and online publishing and is an important component of an
open source enterprise stack called LAMP. LAMP is a Web development platform that uses Linux as
the operating system, Apache as the Web server, MySQL, as the relational database management
system and PHP as the object-oriented scripting language. (Sometimes Perl or Python is used instead
of PHP.) MySQL, which was originally conceived by the Swedish company MySQL AB, was
acquired by Oracle in 2008. Developers can still use MySQL under the GNU General Public License
(GPL), but enterprises must obtain a commercial license from Oracle. Off shoots of MySQL are
called forks. They include:
Using Visual Studio.NET, there is no need to open the Enterprise Manager from SQL Server.
Visual Studio.NET has the SQL Servers tab within the Server Explorer that gives a list of all the
servers that are connected to those having SQL Server on them. Opening up a particular server tab
gives five options:
• Database Diagrams
• Tables
• Views
• Stored Procedures
• Functions
DATABASE DIAGRAMS
To create a new diagram right click Database diagram and select New Diagram. The Add Tables
dialog enables to select one to all the tables that it went in the visual diagram it are going to create.
Visual Studio .NET looks at all the relationships between the tables and then creates a diagram that
opens in the Document window.
Each table is represented in the diagram and a list of all the columns that are available in that
particular table. Each relationship between tables is represented by a connection line between those
tables. The properties of the relationship can be viewed by right clicking the relationship line.
TABLES
The Server Explorer allows to work directly with the tables in SQL Server. It gives a list of tables

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

contained in the particular database selected. By double clicking one of the tables, the table is seen in
the Document window.
This grid of data shows all the columns and rows of data contained in the particular table. The
data can be added or deleted from the table grid directly in the Document window. To add a new row
of data, move to the bottom of the table and type in a new row of data after selecting the first column
of the first blank row. It can also delete a row of data from the table by right clicking the gray box at
the left end of the row and selecting Delete.
By right clicking the gray box at the far left end of the row, the primary key can be set for that
particular column. The relationships to columns in other tables can be set by selecting the
Relationships option. To create a new table right-click the Tables section within the Server Explorer
and selecting New Table. This gives the design view that enables to start specifying the columns and
column details on the table.
To run queries against the tables in Visual Studio .NET, open the view of the query toolbar by
choosing View->Toolbars->Query. To query a specific table, open that table in the Document
window. Then click the SQL button which divides the Document window into two panes-one for
query and another to show results gathered from the query. The query is executed by clicking the
Execute Query button and the result is produced in the lower pane of the Document window.
VIEWS
To create a new view, right-click the View node and select New View. The Add Table dialog box
enables to select the tables from which the view is produced. The next pane enables to customize the
appearance of the data in the view.
FEATURES OF SQL
The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server 2000
Analysis Services. The term OLAP Services has been replaced with the term Analysis Services.
Analysis Services also includes a new data mining component. The Repository component available
in SQL Server version 7.0 is now called Microsoft SQL Server 2000 Meta Data Services.
References to the component now use the term Meta Data Services. The term repository is used
only in reference to the repository engine within Meta Data Services.
SQL-SERVER database consist of six types of objects,

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

They are,
• TABLE
• QUERY
• FORM
• REPORT
• MACRO

TABLE
A database is a collection of data about a specific topic.
VIEWS OF TABLE
It can work with a table in two types,
• Design View
• Datasheet View

DESIGN VIEW
To build or modify the structure of a table, it work in the table design view. It can specify what
kind of data will be held.
DATASHEET VIEW
To add, edit or analyze the data itself, it work in a table datasheet view mode.
QUERY
A query is a question that has to be asked the data. Access gathers data that answers the question
from one or more table. The data that make up, the answer is either diagnosed (if it, edit it) or a
snapshot (it cannot be edited). Each time it run the query, it get the latest information in the dynasty.
Access either displays the dynamic set or snapshot for us to view or perform an action on it such as
deleting or updating.
FORMS
A form is used to view and edit information in the database record by record. A form displays
only the information it want to see in the way it want to see it. Forms use the familiar controls such

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

as textboxes and checkboxes. This makes viewing and entering data easy.

VIEWS OF FORM
It can work with forms in several primarily there are two views, They are,
• Design View
• Form View
DESIGN VIEW
To build or modify the structure of a form, it work in form design view. It can add controls to the
form that are bound to fields in a table or query, includes text boxes, option buttons, graphs and
pictures.
FORM VIEW
The form view, which displays the whole design of the form.
REPORT
A report is used to view and print information from the database. The report can ground records
into many levels and compute totals and average by checking values from many records at once. The
report is also attractive and distinctive because it have control over the size and appearance of it.
MACRO
A macro is a set of actions. Each action in macros does something. Such as opening a form, or
printing a report. It write macros to automate the most common tasks the work easier and save the
time.

XAMPP

What is XAMPP?

XAMPP is an open-source web server package that works on various platforms. It is actually an
acronym with X meaning “cross” platform, A for Apache HTTP server, M for MySQL, P for
PHP, and P for Perl. XAMPP was designed to help webpage developers, programmers, and
designers check and review their work using their computers even without connection to the
web or internet. So, basically XAMPP may be used to stand as pages for the internet even

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

without connection to it. It can also be used to create and configure with databases written in
MySQL and/or SQLite. And since XAMPP is designed as a cross-platform

server package, it is available for a variety of operating systems and platforms like Microsoft
Windows, Mac OS X, Linux, and Solaris. To use XAMPP, only one zip, exe or tar file is
needed. Users just need to download this file and run the application. There is also not much
configuration and tinkering to be done in terms of settings and its components. The XAMPP
package is also updated on a regular basis to synchronize with the updates made on the different
platforms involved in the package like Apache, PHP, Perl, and MySQL.

Aside from being cross-platform, XAMPP is also a freeware. This means users on
different operating systems can download this server package free of charge. Not to mention
that there is no configuration necessary to setup the system. After downloading and extracting
the free application, users can immediately use XAMPP. Users also do not have to worry on
removing the application. If XAMPP is not needed by the user anymore, removing it should not
present any problem. One just needs to delete the XAMPP directory and all the files
concerning this server package will be deleted. Or if XAMPP was installed using the Windows
installer version, one just needs to go to the “uninstall” feature of the operating system to get rid
of the server package.

CSS

Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation
of a document written in a markup language. Although most often used to set the visual style of
web pages and user interfaces written in HTML and XHTML, the language can be applied to
any XML document, including plain XML, SVG and XUL, and is applicable to rendering in
speech, or on other media. CSS is designed primarily to enable the separation of document
content from document presentation, including aspects such as the layout, colors, and fonts.
This separation can improve content accessibility, provide more flexibility and control in the
specification of presentation characteristics, enable multiple HTML pages to share formatting
by specifying the relevant CSS in a separate .css file, and reduce complexity and repetition in
the structural content.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

 This separation of formatting and content makes it possible to present the same markup
page in different styles for different rendering methods, such as on-screen, in print, by voice
(when read out by a speech-based browser or screen reader) and on Braille-based, tactile
devices. It can also be used to display the web page differently depending on the screen size
or device on which it is being viewed. Readers can also specify a different style sheet,
such as a CSS file stored on their own computer, to override the one the author has
specified.

 Changes to the graphic design of a document (or hundreds of documents) can be applied
quickly and easily, by editing a few lines in the CSS file they use, rather than by changing
markup in the documents.

 The CSS specification describes a priority scheme to determine which style rules apply if
more than one rule matches against a particular element. In this so-called cascade, priorities
(or weights) are calculated and assigned to rules, so that the results are predictable.

APACHE

Apache is the most popular Web server software. It enables a computer to host one or
more websites that can be accessed over the Internet using a Web browser. The first version
of Apache was released in 1995 by the Apache Group. In 1999, the Apache Group became
the Apache Software Foundation, a non-profit organization that currently maintains the
development of the Apache Web server software.

Apache's popularity in the Web hosting market is largely because it is open source
and free to use. Therefore, Web hosting companies can offer Apache-based Web hosting
solutions at minimal costs. Other server software, such as Windows Server, requires a
commercial license. Apache also supports multiple platforms, including Linux, Windows, and
Macintosh operating systems. Since many Linux distributions are also open-source, the
Linux/Apache combination has become the most popular Web hosting configuration.
Apache can host static websites, as well as dynamic websites that use server-side
scripting languages, such as PHP, Python, or Perl. Support for these and other languages is
implemented through modules, or installation packages that are added to the standard Apache

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

installation. Apache also supports other modules, which offer advanced security options, file
management tools, and other features. Most Apache installations include a URL rewriting
module called "mod_rewrite," which has become a common way for webmasters to create
custom URLs.
While the Apache Web server software is commonly referred to as just "Apache," it is
technically called "Apache HTTP Server," since the software serves webpages over the HTTP
protocol. When Apache is running, its process name is "httpd," which is short for "HTTP
daemon.
Apache Open Office
Apache Open Office is the leading open-source office software suite for word
processing, spreadsheets, presentations, graphics, databases and more. It is available in many
languages and works on all common computers. It stores all your data in an international open
standard format and can also read and write files from other common office software packages.
It can be downloaded and used completely free of charge for any purpose.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

4.SYSTEM STUDY AND ANALYSIS

4.1 PROBLEM DESCRIPTION

The firewall is one of the central technologies allowing high level access control to
organization networks. Packet matching in firewalls involves matching on many fields from the
TCP and IP packet header.

At least five fields (protocol number, source and destination IP addresses, and ports) are
involved in the decision which rule applies to a given packet. With available bandwidth
increasing rapidly, very efficient matching algorithms need to be deployed in modern firewalls to
ensure that the firewall.

Modern firewalls all use “first match” ,The firewall rules are numbered from 1 to n, and
the firewall applies the policy (e.g., pass or drop) associated with the first rule that matches a
given packet.

Firewall packet matching is reminiscent of the well studied packet matching problem.
However, there are several crucial differences which make the problems quite different. First,
unlike firewalls, routers use “longest prefix match” semantics. Therefore, firewalls require their
own special algorithm

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

4.2 EXISTING SYSTEM

Existing algorithms implement the “longest prefix match” semantics, using several
different approaches. The IPL algorithm, which is based on results, divides the search space into
elementary intervals by different prefixes for each dimension, and finds the best (longest) match
for each such interval.

Firewall state fulness is commonly implemented by two separate search mechanisms:

(i) A slow algorithm that implements the “first match” semantics and compares a
packet to all the rules

(ii) A fast state lookup mechanism that checks whether a packet belongs to an
existing open flow. In many firewalls, the slow algorithm is a naive linear
search of the rule-base, while the state lookup mechanism uses a hash-table or
a search-tree

Disadvantages:

 There is no secure when the packet sending:

 Firewall not used before


 Time consuming is high

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

4.3 PROPOSED SYSTEM

In the field of computational geometry, proposed an algorithm which solves the point
location problem for n non-overlapping d-dimensional hyper-rectangles, with a linear space
requirement and O ((log n) (d−1)) search time.

In our case, we have overlapping d-dimensional hyper-rectangles, since firewall rules


can, and often do, overlap each other— making rules overlap is the method firewall
administrators use to implement intersection and difference operations on sets of IP addresses or
port numbers.

These overlapping hyper-rectangles can be decomposed into non-overlapping hyper-


rectangles—however, a moment’s reflection shows that the number of resulting non-overlapping
hyper-rectangles is (nd) , thus the worst case complexity for firewall rules is no better than that
of GEM.

Advantages:

 Packet filter firewall supports high speed:

 Packet filter firewall over configurations of simple network works with more speed. The thing
behind this is that packet filter firewall has the directly connection within external hosts &
internal users.

 Packet filters take decisions on the basis of the each packets, it doesn't take decision on the
basis of the traffic context. An increases the vulnerability over internet.

 It used to implement and enforce a security policy for communication between


 networks

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

5.SYSTEM ARCHITECTURE
5.1 SYSTEM FLOW CHART

Database

Encryption Protection Detection of Random Rule


rules invalid user simulation

Apply
Verify key and Assign
Send protection
detect invalid rule for
encrypted rules
user users
key to user

Assign ports to
user for file
access Firewall protection

Login and monitor


Login or
user access
register to
database Request for
files

User Admin

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

5.2 DATA FLOW DIAGRAM

Firewall

Update Database
new users
Authenticate

Register new
Logi
user
Registe

User Login to
Admin
system

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

5.3 DATABASE STRUCTURE

TABLE NAME: USER

S.NO FIELD NAME DATA TYPE DESCRIPTION

1 Username nvarchar(MAX) Name of the user

2 Password nvarchar(MAX) Password

3 Email nvarchar(MAX) Email id

4 Mobile nvarchar(MAX) Mobile number

TABLE NAME: EMPLOYEE

S.NO FIELD NAME DATA TYPE DESCRIPTION

1 Username nvarchar(MAX) Name of the user

2 Employee Id nvarchar(MAX) Employee Id

3 Employee name nvarchar(MAX) Employee name

4 Mobile nvarchar(MAX) Mobile number

5 Email nvarchar(MAX) Email id

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

TABLE NAME: REQUEST

S.NO FIELD NAME DATA TYPE DESCRIPTION

1 Username nvarchar(MAX) Name of the user

2 Employee ID nvarchar(MAX) Employee ID

3 Request status nvarchar(MAX) Requested query status

4 Request id nvarchar(MAX) Requested query id

5 Mail key nvarchar(MAX) The key for mail

TABLE NAME: KEY

S.NO FIELD NAME DATA TYPE DESCRIPTION

1 Link key nvarchar(MAX) The key for link

2 Encryption key nvarchar(MAX) The key for encryption

3 Mail key nvarchar(MAX) The key for mail

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

6. SYSTEM DESIGN AND DEVELOPMENT


Firewall packet matching is reminiscent of the well studied packet matching
problem. However, there are several crucial differences which make the problems quite different.
First, unlike firewalls, routers use “longest prefix match” semantics. Therefore, firewalls require
their own special algorithms.

MODULES

1. Firewall Splitting and Matching:

In order to test the build time, data structure size and search speed behavior, the system
generated rule-bases of sizes from 1000 to 20000 and built the GEM data structure using two
approaches: 2-part heuristic splitting and 3-part heuristic splitting, as described. It shows the data
structure size of the un-split, 2- part splitting and 3-part splitting approaches it shows that both
splitting heuristics are very effective in reducing the data structure size. In earlier simulations the
system verified that the firewall’s matching speed is largely unaffected by the distribution of port
numbers (both linear search and GEM). There is an extensive literature dealing with router
packet matching, usually called “packet classification”, Thus the system believe that GEM may
be a good candidate for use in firewall matching engines.

Access database
Firewall

Update Database
new users
Authenticate

Register new
Logi
user
Registe

User Login to
Admin
system

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

2. Encryption module:

Allows trusted users to access sensitive information while traversing untrusted


networks, it is highly useful for users. The services and users are limited in their tunnel traffic.

Firewall
Database
Process request
Provide encrypted
key

Reque
Monito Monitor user
access
Request
for file
User
Admin

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

7.SYSTEM TESTING AND MAINTENANCE


SYSTEM TESTING

The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components sub assembles and/or a finished product. It is the process of
exercising software with the intent of ensuring that the software system meets its requirements
and user expectations and does not fail in an unacceptable manner. There are various types of
test. Each test type addresses a specific testing requirement.

TYPES OF TESTS:

UNIT TESTING:

Unit testing involves the design of test cases that the internal program logic is functioning
properly, and that program inputs produce valid outputs. All decision branches and internal code
flow should be validated. It is the testing of individual software units of the application. It is
done after the completion of an individual unit before integration.

INTEGRATION TESTING:

Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.

FUNCTIONAL TESTING:

Function tests provide a systematic demonstration that functions tested are available as
specified by the business and technical requirements, system documentation and user manuals.

Functional testing is centered on the following items:

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Valid Input : Identified classes of valid input must be accepted.

Invalid Input : Identified classes of invalid input must be rejected.

Functions : Identified functions must be exercised.

Output : Identified classes of application outputs must be exercised

System/Procedures : Inter facing systems or procedures must be invoked.


Organization and preparation of functional tests is focused on requirements, key functions, or
special test cases. In addition, systematic coverage pertaining to identify.

Business process flows, data fields, predefined processes, and successive processes must
be considered for testing. Before functional testing is complete, additional tests are identified and
the effective value of current tests is determined.

MAINTENANCE

Maintenance means improvement of system functions and the correction of faults, which
arise during the operation of the system. In this phase the product is maintained or changed to
satisfy the changes that arise from the customer expectations, environmental changes etc.
Maintenance is made up of,

 Corrective maintenance

 Adaptive maintenance

 Preventive maintenance
PERFORMANCE TESTING:

Performance test was conducted to identify the bottlenecks involved in the system and to
evolve the amount of execution time spent on various part of the unit. The response time of the
activities performed by the system is verified and is found to be reasonable.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

7. SAMPLE CODE

FORM 1:

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Net;
using System.Net.Sockets;
using System.IO;
using System.Windows.Forms;

namespace Clients
{
public partial class Form1 : Form
{
IPEndPoint ipEnd;
Socket clientSock;
BinaryWriter bWrite;
string GetIPv4Address = String.Empty;
string ipAddress = string.Empty;
private string ip;
public Form1()
{

public Form1(string ip)

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

{
InitializeComponent();
// TODO: Complete member initialization
this.ip = ip;
GetIPv4Address = ip;
}

private void button1_Click(object sender, EventArgs e)


{

IPAddress[] ipAddress = Dns.GetHostAddresses(GetIPv4Address);


//IPEndPoint ipEnd = new IPEndPoint(ipAddress[0], 8888);

if (MessageBox.Show("Connect with Ip :-" + GetIPv4Address, GetIPv4Address,


MessageBoxButtons.YesNo, MessageBoxIcon.Information) == DialogResult.Yes)
{

// IPAddress[] ipAddress = Dns.GetHostAddresses("172.16.1.2");


ipEnd = new IPEndPoint(ipAddress[0], 8080);
clientSock = new Socket(AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.IP);
clientSock.Connect(ipEnd);
}

byte[] clientData = new byte[1024 * 5000];


string receivedPath = @"C:\";

int receivedBytesLen = clientSock.Receive(clientData);

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

int fileNameLen = BitConverter.ToInt32(clientData, 0);


string fileName = Encoding.ASCII.GetString(clientData, 4, fileNameLen);
string filenameonly = System.IO.Path.GetFileName(fileName);

MessageBox.Show("Ip :-" + GetIPv4Address + " connected\n" + " File received." +


clientSock.RemoteEndPoint);

MessageBox.Show(filenameonly);
string full = receivedPath + filenameonly;

if (System.IO.Path.GetExtension(filenameonly) == ".exe" ||
System.IO.Path.GetExtension(filenameonly) == ".lnk")
{
if (MessageBox.Show("Click Yes To Continue", "Warning", MessageBoxButtons.YesNo,
MessageBoxIcon.Warning) == DialogResult.Yes)
{

// if (MessageBox.Show("Click Yes To Receive Data", "waiting.. . .",


MessageBoxButtons.YesNo, MessageBoxIcon.Information) == DialogResult.Yes)
// {
progressBar1.Value = 0;
for (int k = 0; k < 100; k++)
{
System.Threading.Thread.Sleep(250);
progressBar1.Value = 1 + k;
}

bWrite = new BinaryWriter(File.Open(full, FileMode.Append));


bWrite.Write(clientData, 4 + fileNameLen, receivedBytesLen - 4 - fileNameLen);
Sir Issac Newton College of Arts and Science
A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

// MessageBox.Show(receivedPath);
// MessageBox.Show(filenameonly);
MessageBox.Show("received Successfully " + "\n Filename :\t:" + fileName, "Status",
MessageBoxButtons.OK, MessageBoxIcon.Information);
bWrite.Close();
clientSock.Close();

Forminfo finfo = new Forminfo(GetIPv4Address, filenameonly, fileNameLen, receivedPath);


}
}
if (System.IO.Path.GetExtension(filenameonly) != ".exe" &&
System.IO.Path.GetExtension(filenameonly) != ".lnk")
{
try
{

progressBar1.Value = 0;
for (int k = 0; k < 100; k++)
{
System.Threading.Thread.Sleep(250);
progressBar1.Value = 1 + k;
}

bWrite = new BinaryWriter(File.Open(full, FileMode.Append));


bWrite.Write(clientData, 4 + fileNameLen, receivedBytesLen - 4 - fileNameLen);
// MessageBox.Show(receivedPath);
// MessageBox.Show(filenameonly);
MessageBox.Show("received Successfully " + "\n Filename :\t:" + fileName + "\nPath :\t" +
receivedPath, "Status", MessageBoxButtons.OK, MessageBoxIcon.Information);
bWrite.Close();
clientSock.Close();
Sir Issac Newton College of Arts and Science
A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Forminfo finfo = new Forminfo(GetIPv4Address, filenameonly, fileNameLen, receivedPath);

}
catch (Exception ex)
{
MessageBox.Show("Connection Busy Try Later");
}
}
}

private void Form1_Load(object sender, EventArgs e)


{
var currentArea = Screen.FromControl(this).WorkingArea;

// this.Left= (Screen.PrimaryScreen.WorkingArea.Width) / 2;
// this.Top = (Screen.PrimaryScreen.WorkingArea.Height) / 2;

this.Top = currentArea.Top + Convert.ToInt16((currentArea.Height / 2) - (this.Height / 2));


this.Left = currentArea.Left + Convert.ToInt16((currentArea.Width / 2) - (this.Width / 2));
}
}
}

//try
//{
//string strHostName = Dns.GetHostName();
//IPHostEntry iphe = System.Net.Dns.GetHostEntry(strHostName);

//foreach (IPAddress iphel in iphe.AddressList)


Sir Issac Newton College of Arts and Science
A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

//{
// if (iphel.AddressFamily == AddressFamily.InterNetwork)
// {
// GetIPv4Address = iphel.ToString();
// }
//}
//}
//catch (Exception ex)
//{
// MessageBox.Show(ex.Message + ex.Data);
//}

// Console.ReadLine();

FORMINFOR :
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace Clients
{
public partial class Forminfo : Form
{
private string GetIPv4Address;
private string filenameonly;
private int fileNameLen;

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

private string receivedPath;

public Forminfo()
{

public Forminfo(string GetIPv4Address, string filenameonly, int fileNameLen, string


receivedPath)
{
InitializeComponent();
// TODO: Complete member initialization
this.GetIPv4Address = GetIPv4Address;
this.filenameonly = filenameonly;
this.fileNameLen = fileNameLen;
this.receivedPath = receivedPath;
this.Show();
label2.Text = GetIPv4Address;
label4.Text = filenameonly;
label6.Text = fileNameLen.ToString();
label8.Text = receivedPath.ToString();
}

private void Forminfo_Load(object sender, EventArgs e)


{
var currentArea = Screen.FromControl(this).WorkingArea;

// this.Left= (Screen.PrimaryScreen.WorkingArea.Width) / 2;
// this.Top = (Screen.PrimaryScreen.WorkingArea.Height) / 2;

this.Top = currentArea.Top + Convert.ToInt16((currentArea.Height / 2) - (this.Height / 2));


Sir Issac Newton College of Arts and Science
A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

this.Left = currentArea.Left + Convert.ToInt16((currentArea.Width / 2) - (this.Width / 2));


}

private void button1_Click(object sender, EventArgs e)


{
this.Close();
}
}
}

LOGGING :
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace Clients
{
public partial class Logging : Form
{
public Logging()
{
InitializeComponent();
}

private void button1_Click(object sender, EventArgs e)

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

if (textBox1.Text == "user" && textBox2.Text == "8080")


{
SearchIp sear = new
SearchIp(); sear.Show();
this.Hide();
}
else
{
MessageBox.Show("Invalid Pin Or Id");
}
}

private void Logging_Load(object sender, EventArgs e)


{
var currentArea = Screen.FromControl(this).WorkingArea;

// this.Left= (Screen.PrimaryScreen.WorkingArea.Width) / 2;
// this.Top = (Screen.PrimaryScreen.WorkingArea.Height) / 2;

this.Top = currentArea.Top + Convert.ToInt16((currentArea.Height / 2) - (this.Height / 2));


this.Left = currentArea.Left + Convert.ToInt16((currentArea.Width / 2) - (this.Width / 2));
}
}
}

SEARCH IP :
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace Clients
{
public partial class SearchIp : Form
{
ComboBox combo = new ComboBox();
public SearchIp()
{
InitializeComponent();
}

private void SearchIp_Load(object sender, EventArgs e)


{

// combo.SelectedValueChanged +=new EventHandler(combo_SelectedValueChanged);


combo.SelectedIndexChanged += new EventHandler(combo_SelectedIndexChanged);
var currentArea = Screen.FromControl(this).WorkingArea;

// this.Left= (Screen.PrimaryScreen.WorkingArea.Width) / 2;
// this.Top = (Screen.PrimaryScreen.WorkingArea.Height) / 2;

this.Top = currentArea.Top + Convert.ToInt16((currentArea.Height / 2) - (this.Height / 2));


this.Left = currentArea.Left + Convert.ToInt16((currentArea.Width / 2) - (this.Width / 2));
// this.Height = (Screen.PrimaryScreen.WorkingArea.Height) / 2;
// this.Width = (Screen.PrimaryScreen.WorkingArea.Width) / 2;
}
Sir Issac Newton College of Arts and Science
A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

private void button1_Click(object sender, EventArgs e)


{
// showprocess();
progressBar1.Value = 0;
for (int k = 0; k < 100; k++)
{
System.Threading.Thread.Sleep(100);
progressBar1.Value = 1 + k;
}

groupBox1.Show();
// System.Threading.Thread.Sleep(6000);
combo.Text = "Select Your Ip";
ComboBox machine = new ComboBox();
TableLayoutPanel table = new TableLayoutPanel();
TextBox my;
Label la;
int i = 0;
string msg = "";
string[] ip = new string[15];
string hostnames = string.Empty;

System.Net.NetworkInformation.Ping p = new System.Net.NetworkInformation.Ping();


for (i = 1; i < 12; i++)
{
System.Net.NetworkInformation.PingReply rep = p.Send("172.16.1." + i.ToString());
if (rep.Status == System.Net.NetworkInformation.IPStatus.Success)
{

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

// my= new TextBox();


// my.Text = rep.Address.ToString();
// //my.Location =new System.Drawing.Point(i+20,i+60);
// //my.Width = Screen.PrimaryScreen.Bounds.Width;
//// my.Anchor = AnchorStyles.Bottom;

// MessageBox.Show("Success"+rep.Address.ToString());
//ip[i]= rep.Address.ToString();
//msg = msg + ip[i].ToString();
// MessageBox.Show(ip[i].ToString());
//ip[i]=rep.Status.ToString();
//count++;
//IPHostEntry host;
//host = Dns.GetHostEntry(ip[i].ToString());
// hostnames= host.HostName;
// machine.Items.Add(hostnames);

table.Dock = DockStyle.Bottom;
table.Width = 200;
table.RowCount = 1;

// table.BackgroundImage=Image.FromFile("D:\\NetworkIp\\NetworkIp\\Ima\\blue-gradient-
abstract-hd-wallpaper-1920x1200-4430.jpg");
table.BackColor = Color.Transparent;
ip[i] = rep.Address.ToString();
combo.Items.Add((ip[i].ToString()));
table.Controls.Add(combo);
//this.Controls.Add(machine);
this.Controls.Add(table);

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

}
}
}
private void combo_SelectedIndexChanged(object sender, EventArgs e)
{

string ip = combo.SelectedItem.ToString();
if (MessageBox.Show("Connected Ip\t:" + ip, "Ip", MessageBoxButtons.YesNo,
MessageBoxIcon.Question) == DialogResult.Yes)
{
Form1 form1 = new Form1(ip);

form1.Show();
this.Hide();
// ClientConnect cc = new ClientConnect(ip);
// cc.Show();

}
// combo.SelectedValueChanged +=new EventHandler(combo_SelectedValueChanged);
combo.SelectedIndexChanged += new EventHandler(combo_SelectedIndexChanged);
var currentArea = Screen.FromControl(this).WorkingArea;

// this.Left= (Screen.PrimaryScreen.WorkingArea.Width) / 2;
// this.Top = (Screen.PrimaryScreen.WorkingArea.Height) / 2;

this.Top = currentArea.Top + Convert.ToInt16((currentArea.Height / 2) - (this.Height / 2));


this.Left = currentArea.Left + Convert.ToInt16((currentArea.Width / 2) - (this.Width / 2));
// this.Height = (Screen.PrimaryScreen.WorkingArea.Height) / 2;
// this.Width = (Screen.PrimaryScreen.WorkingArea.Width) / 2;
}

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

private void button1_Click(object sender, EventArgs e)


{
// showprocess();
progressBar1.Value = 0;
for (int k = 0; k < 100; k++)
{
System.Threading.Thread.Sleep(100);
progressBar1.Value = 1 + k;
}

groupBox1.Show();
// System.Threading.Thread.Sleep(6000);
combo.Text = "Select Your Ip";
ComboBox machine = new ComboBox();
TableLayoutPanel table = new TableLayoutPanel();
TextBox my;
Label la;
int i = 0;
string msg = "";
string[] ip = new string[15];
string hostnames = string.Empty;

}
}
// combo.SelectedValueChanged +=new EventHandler(combo_SelectedValueChanged);
combo.SelectedIndexChanged += new EventHandler(combo_SelectedIndexChanged);
var currentArea = Screen.FromControl(this).WorkingArea;

// this.Left= (Screen.PrimaryScreen.WorkingArea.Width) / 2;
// this.Top = (Screen.PrimaryScreen.WorkingArea.Height) / 2;
Sir Issac Newton College of Arts and Science
A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

this.Top = currentArea.Top + Convert.ToInt16((currentArea.Height / 2) - (this.Height / 2));


this.Left = currentArea.Left + Convert.ToInt16((currentArea.Width / 2) - (this.Width / 2));
// this.Height = (Screen.PrimaryScreen.WorkingArea.Height) / 2;
// this.Width = (Screen.PrimaryScreen.WorkingArea.Width) / 2;
}

private void button1_Click(object sender, EventArgs e)


{
// showprocess();
progressBar1.Value = 0;
for (int k = 0; k < 100; k++)
{
System.Threading.Thread.Sleep(100);
progressBar1.Value = 1 + k;
}

groupBox1.Show();
// System.Threading.Thread.Sleep(6000);
combo.Text = "Select Your Ip";
ComboBox machine = new ComboBox();
TableLayoutPanel table = new TableLayoutPanel();
TextBox my;
Label la;
int i = 0;
string msg = "";
string[] ip = new string[15];
string hostnames = string.Empty;

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

SOCKET :

System.Net.NetworkInformation.Ping p = new System.Net.NetworkInformation.Ping();


for (i = 1; i < 12; i++)
{
System.Net.NetworkInformation.PingReply rep = p.Send("172.16.1." + i.ToString());
if (rep.Status == System.Net.NetworkInformation.IPStatus.Success)
{

// my= new TextBox();


// my.Text = rep.Address.ToString();
// //my.Location =new System.Drawing.Point(i+20,i+60);

// //my.Width = Screen.PrimaryScreen.Bounds.Width;
//// my.Anchor = AnchorStyles.Bottom;

// MessageBox.Show("Success"+rep.Address.ToString());
//ip[i]= rep.Address.ToString();
//msg = msg + ip[i].ToString();
// MessageBox.Show(ip[i].ToString());
//ip[i]=rep.Status.ToString();
//count++;
//IPHostEntry host;
//host = Dns.GetHostEntry(ip[i].ToString());
// hostnames= host.HostName;
// machine.Items.Add(hostnames);

table.Dock = DockStyle.Bottom;
table.Width = 200;
table.RowCount = 1;

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

// table.BackgroundImage=Image.FromFile("D:\\NetworkIp\\NetworkIp\\Ima\\blue-gradient-
abstract-hd-wallpaper-1920x1200-4430.jpg");
table.BackColor = Color.Transparent;
ip[i] = rep.Address.ToString();
combo.Items.Add((ip[i].ToString()));
table.Controls.Add(combo);
//this.Controls.Add(machine);
this.Controls.Add(table);

}
p.Dispose();
}

private void SearchIp_Load(object sender, EventArgs e)


{
// combo.SelectedValueChanged +=new EventHandler(combo_SelectedValueChanged);
combo.SelectedIndexChanged += new EventHandler(combo_SelectedIndexChanged);
var currentArea = Screen.FromControl(this).WorkingArea;

// this.Left= (Screen.PrimaryScreen.WorkingArea.Width) / 2;
// this.Top = (Screen.PrimaryScreen.WorkingArea.Height) / 2;

this.Top = currentArea.Top + Convert.ToInt16((currentArea.Height / 2) - (this.Height / 2));


this.Left = currentArea.Left + Convert.ToInt16((currentArea.Width / 2) - (this.Width / 2));
// this.Height = (Screen.PrimaryScreen.WorkingArea.Height) / 2;
// this.Width = (Screen.PrimaryScreen.WorkingArea.Width) / 2;
}
private void combo_SelectedIndexChanged(object sender, EventArgs e)
{
string ip = combo.SelectedItem.ToString();

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

if (MessageBox.Show("Connected Ip\t:" + ip, "Ip", MessageBoxButtons.YesNo,


MessageBoxIcon.Question) == DialogResult.Yes)
{
Transfer transfer = new Transfer(ip);

transfer.Show();
this.Hide();
// ClientConnect cc = new ClientConnect(ip);
// cc.Show();
}

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

8. SAMPLE SCREEN DISPLAY

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

CLIENT

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

10.REPORTS

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

11. CONCLUSION
The GEM algorithm is an efficient and practical algorithm for firewall packet
matching. We implemented it successfully, and tested its packet-matching speeds .
GEM’s matching speed is far better than the naive linear search, and it is able to
increase the throughput by an order of magnitude. On rule-bases generated according
to realistic statistics, GEM’s space complexity is well within the capabilities of modern
hardware. Thus we believe that GEM may be a good candidate for use in firewall
matching engines.

Sir Issac Newton College of Arts and Science


A Heuristic Approach for Privacy Preserving Protocol for Cooperative Firewall Optimization

12.BIBLIOGRAPHY

REFERENCES MADE FROM:

1. User Interfaces in C#: Windows Forms and Custom Controls by Matthew MacDonald.
2. Applied Microsoft® .NET Framework Programming (Pro-Developer) by Jeffrey Richter.
3. Practical .Net2 and C#2: Harness the Platform, the Language, and the Framework
by Patrick Smacchia.
4. Operating System Concepts, by Abraham Silberschatz.
5. Amichai-Hamburger, Y., Fine, A., & Goldstein, A. (2004). The impact of Internet
interactivity and need for closure on consumer preference. Computers in Human
Behavior, 20, 103-117.
6. F. Baboescu and G. Varghese, “Scalable packet classification,” in Proc. ACM
SIGCOMM, 2001, pp. 199–210.

WEBSITES
http://www.sourcefordgde.com

http://www.patentstorm.us/patents/7124098.html

http://mktsci.journal.informs.org/cgi/content/abstract/19/1/4

http://www.almaden.ibm.com/software/quest/Resources/

http://www.computer.org/publications/dlib

Sir Issac Newton College of Arts and Science

You might also like