Visibility: a novel concept for characterising provable network digital evidences
International Journal of Security and Networks
Resiliency of open-source firewalls against remote discovery of last-matching rules
Proceedings of the 2nd international conference on Security of information and networks
Discovering last-matching rules in popular open-source and commercial firewalls
International Journal of Internet Protocol Technology
Hi-index | 0.00 |
Firewalls offer a protection for private networksagainst both internal and external attacks. However,configuring firewalls to ensure the protections is adifficult task. The main reason is the lack of methodologyto analyze the security of firewall configurations. IPspoofing attack is an attack in which an attacker canimpersonate another person towards a victim. In thispaper, we propose a new methodology for verifying thevulnerability of firewall configurations to IP spoofingattack and for synthesizing IP spoofing-freeconfigurations. Our methodology is based on graphtheory which provides a simple and intuitive approach tothe vulnerability analysis of the attack.