A Graph Theoretic Model for Hardware-based Firewalls

  • Authors:
  • Yongyuth Permpootanalarp;Chaiwat Rujimethabhas

  • Affiliations:
  • -;-

  • Venue:
  • ICON '01 Proceedings of the 9th IEEE International Conference on Networks
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Firewalls offer a protection for private networks againstexternal attacks.However, configuring firewalls is adifficult task.The reason is that the effects of a firewallconfiguration cannot be easily seen during theconfiguration time.As a result, errors and loopholes infirewall configurations, if exist, are discovered only afterthey actually happen at the execution time.In this paper,we propose a preliminary yet novel model and itsmethodology for hardware-based firewalls.Our modeloffers precise and simple understanding of effects offirewall configurations.Moreover, our methodologyoffers an analysis of effects of firewall configurations.In particular, it provides reasoning about the correctness offirewall configurations.Also, the redundancy andinconsistency of firewall rules can be reasoned about.Asa result, many kinds of errors and loopholes of firewallconfigurations can be detected during the configurationtime.