Fill This Form To Receive Instant Help
Homework answers / question archive / Project 3(20 Points) Description A firewall may contain a large number of rules and some of them might be conflicting with others
Project 3(20 Points)
Description
A firewall may contain a large number of rules and some of them might be conflicting with others. We consider a firewall whose rules use the following format:
The lower bound of the source IP and the upper bound of the source IP together form the subnet for the source IP addresses; The lower bound of the destination IP and the upper bound of the destination IP together form the subnet for the destination IP addresses.
Two examples of rules are given as follows:
For the first rule, [10, 20] is the subnet of the source IP addresses and [30, 40] is the subnet of the destination IP addresses;
For the second rule, [10, 10] is the subnet of the source IP addresses (actually it represents a single IP address); and [30, 30] is the subnet of the destination IP addresses.
Two rules will be conflicting if one packet can match both rules but lead to different actions. For two rules above, they are conflicting since a TCP packet with source IP address of 10 and destination IP address of 30 may lead to conflicting actions (ACCEPT or DENY).
You are asked to implement the conflicting rule detection engine using the Prolog. You can use the following rules to test your system. But the instructor may use additional rules to test your system for grading.
Deliverable
You will deliver a package that contains
Your prolog-based model should be able to enumerate all possible conflicting rules in a given rule set.
Team
Programming Environment
For the programming environment, B-Prolog is recommended.
Already member? Sign In