Rule Anomalies Detection in Firewalls

被引:0
|
作者
Liao Xiaoju [1 ]
Wang Yi [1 ]
Lu Hai [1 ]
机构
[1] China Acad Engn Phys, Beijing 621900, Peoples R China
关键词
firewall; anomalies detection; firewall management; network security;
D O I
10.4028/www.scientific.net/KEM.474-476.822
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Firewall is the most prevalent and important technique to enforce the security inside the networks. However, effective and free anomalies rules management in large and fast growing networks becomes increasingly challenging. In this paper, we use a directed tree-based method to detect rule anomalies in firewall; in addition, this method can track the source of the anomalies. We believe the posed information will simplify the rules management and minimizing the networking vulnerability due to firewall rules misconfigurations.
引用
收藏
页码:822 / 827
页数:6
相关论文
共 50 条
  • [1] An ARAR-Tree-Based Diagnosis Mechanism for Rule Anomalies Among Internet Firewalls
    Chao, Chi-Shih
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNOLOGIES AND ENGINEERING SYSTEMS (ICITES2014), 2016, 345 : 175 - 181
  • [2] Handling anomalies in distributed firewalls
    Bouhoula, Adel
    Trabelsi, Zouheir
    2006 Innovations in Information Technology, 2006, : 237 - 241
  • [3] Firewalls Anomalies' Detection System based on Web Services/Mobile Agents Interactions
    Ftima, Fakher Ben
    Karoui, Kamel
    Ghzela, Henda Ben
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 235 - 241
  • [4] Analysis of Policy Anomalies in Distributed Firewalls
    Cheng, Yu-Zhu
    Shi, Qiu-Ying
    International Journal of Network Security, 2022, 24 (04) : 617 - 627
  • [5] Discovery of policy anomalies in distributed firewalls
    Al-Shaer, ES
    Harried, HH
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2605 - 2616
  • [6] Firewalls anomalies severity evaluation and classification
    Karoui, Kamel
    Ben Ftima, Fakher
    Ben Ghezala, Henda
    International Journal of Security and Networks, 2014, 9 (03) : 167 - 176
  • [7] Ethical firewalls, limited admissibility, and Rule 703
    Blinka, Daniel D.
    FORDHAM LAW REVIEW, 2007, 76 (03) : 1229 - 1262
  • [8] A Rule Relation Calculus for Verification and Validation of Firewalls
    Kalita, Shobhanjana
    Hazarika, Shyamanta M.
    2013 NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2013,
  • [9] Complete redundancy detection in firewalls
    Liu, AX
    Gouda, MG
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 193 - 206
  • [10] Anomaly Detection: Firewalls Capabilities and Limitations
    Alsehibani, Sultan
    Almuhammadi, Sultan
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES AND ENGINEERING (ICCSE), 2018,