Dynamic rule-ordering optimization for high-speed firewall filtering
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Effects of processing delay on function-parallel firewalls
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Simulation Study of Firewalls to Aid Improved Performance
ANSS '06 Proceedings of the 39th annual Symposium on Simulation
An argument for simple embedded ACL optimisation
Computer Communications
Real-time optimisation of access control lists for efficient Internet packet filtering
Journal of Heuristics
An inference system for detecting firewall filtering rules anomalies
Proceedings of the 2008 ACM symposium on Applied computing
Declarative Infrastructure Configuration Synthesis and Debugging
Journal of Network and Systems Management
Model-Based Development of firewall rule sets: Diagnosing model inconsistencies
Information and Software Technology
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
PolicyGlobe: a framework for integrating network and operating system security policies
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Managing intrusion detection rule sets
Proceedings of the Third European Workshop on System Security
Network Security: Formal and Optimized Configuration
Proceedings of the 2010 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the 9th SoMeT_10
Safe and efficient strategies for updating firewall policies
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Policy segmentation for intelligent firewall testing
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Towards automated identification of security zone classification in enterprise networks
Hot-ICE'11 Proceedings of the 11th USENIX conference on Hot topics in management of internet, cloud, and enterprise networks and services
Modality conflict discovery for SOA security policies
APPT'11 Proceedings of the 9th international conference on Advanced parallel processing technologies
Journal of Systems and Software
A fast and scalable conflict detection algorithm for packet classifiers
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Consistency maintenance of modern security policies
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Network-level access control policy analysis and transformation
IEEE/ACM Transactions on Networking (TON)
A model-driven approach for the extraction of network access-control policies
Proceedings of the Workshop on Model-Driven Security
On the notion of redundancy in access control policies
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |
Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become complex and error-prone. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. In addition, inserting or modifying a filtering rule requires thorough analysis of the relationship between this rule and other rules in order to determine the proper order of this rule and commit the updates. In this paper we present a set of techniques and algorithms that provide automatic discovery of firewall policy anomalies to reveal rule conflicts and potential problems in legacy firewalls, and anomaly-free policy editing for rule insertion, removal, and modification. This is implemented in a user-friendly tool called 驴Firewall Policy Advisor.驴 The Firewall Policy Advisor significantly simplifies the management of any generic firewall policy written as filtering rules, while minimizing network vulnerability due to firewall rule misconfiguration.