A Topological Calculus for Firewalls

被引:0
|
作者
Kalita, Shobhanjana [1 ]
Hazarika, Shyamanta M. [1 ]
机构
[1] Tezpur Univ, Biomimet & Cognit Robot Lab, Tezpur 784028, India
关键词
firewall; rule-based filter; topological relation; first order anomaly; second-order anomaly;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Firewalls are rule based filters, composed of a sequence of rule. Each rule has a condition and an action. The condition is made up of network fields that can be seen as points in a topological space. Thus, firewall rule conditions can be seen as regions within a topological space. In this paper, we propose a topological calculus and exhaustively analyze all possible configurations to identify the topological relationships that can exist between a pair of firewall rules. Anomalies are properties of firewalls that hint at possible misconfigurations within the firewall. Anomalies including all those that are identified in literature are definable within the calculus.
引用
收藏
页码:219 / 223
页数:5
相关论文
共 50 条
  • [41] Firewalls for the Web 2.0
    Rietz, Rene
    Koenig, Hartmut
    Ullrich, Steffen
    Stritter, Benjamin
    2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2016), 2016, : 242 - 253
  • [42] Smartcard firewalls revisited
    Poehls, Henrich C.
    Posegga, Joachim
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 179 - 191
  • [43] System insecurity - Firewalls
    Desal, Mayur S.
    Richards, Thomas C.
    Von der Embse, Thomas
    Information Management and Computer Security, 2002, 10 (2-3): : 135 - 139
  • [44] Firewalls: An expert roundtable
    Anderson, JP
    Brand, S
    Gong, L
    Haigh, T
    Lipner, S
    Lunt, T
    Nelson, R
    Neugent, W
    Orman, H
    Ranum, M
    Schell, R
    Spafford, E
    IEEE SOFTWARE, 1997, 14 (05) : 60 - 66
  • [45] On firewalls evaluation criteria
    Noureldien, NA
    Osman, IM
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B104 - B110
  • [46] The spectrum of modern firewalls
    Nacht, M
    COMPUTERS & SECURITY, 1998, 17 (01) : 54 - 56
  • [47] ATM security with firewalls
    Simon, C
    Török, A
    ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, : 186 - 191
  • [48] Firewalls: An outdated defense
    Arbaugh, WA
    COMPUTER, 2003, 36 (06) : 112 - 113
  • [49] Firewalls against BSE
    不详
    JOURNAL OF EQUINE VETERINARY SCIENCE, 2004, 24 (04) : 140 - 140
  • [50] The imminent demise of firewalls
    Blond, O
    RECHERCHE, 2000, (328): : 74 - 75