Rule Anomalies Detection in Firewalls

被引:0
|
作者
Liao Xiaoju [1 ]
Wang Yi [1 ]
Lu Hai [1 ]
机构
[1] China Acad Engn Phys, Beijing 621900, Peoples R China
关键词
firewall; anomalies detection; firewall management; network security;
D O I
10.4028/www.scientific.net/KEM.474-476.822
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Firewall is the most prevalent and important technique to enforce the security inside the networks. However, effective and free anomalies rules management in large and fast growing networks becomes increasingly challenging. In this paper, we use a directed tree-based method to detect rule anomalies in firewall; in addition, this method can track the source of the anomalies. We believe the posed information will simplify the rules management and minimizing the networking vulnerability due to firewall rules misconfigurations.
引用
收藏
页码:822 / 827
页数:6
相关论文
共 50 条
  • [41] Concerning solubility anomalies and a new type of bodenkorper rule
    Verstraete, EOK
    KOLLOID-ZEITSCHRIFT, 1943, 104 (01): : 96 - 106
  • [42] Rule Anomalies Detecting and Resolving for Software Defined Networks
    Wang, Pengzhan
    Huang, Liusheng
    Xu, Hongli
    Leng, Bing
    Guo, Hansong
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [43] A General Formalism for Defining and Detecting OpenFlow Rule Anomalies
    Aryan, Ramtin
    Yazidi, Anis
    Engelstad, Paal Einar
    Kure, Oivind
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 426 - 434
  • [44] ANOMALIES OF THE URBACH RULE PARAMETERS IN PBTIO3
    YAKUBOVSKII, MA
    ZAMETIN, VI
    RABKIN, LM
    FESENKO, EG
    FIZIKA TVERDOGO TELA, 1980, 22 (08): : 2472 - 2474
  • [45] Firewalls for the Web 2.0
    Rietz, Rene
    Koenig, Hartmut
    Ullrich, Steffen
    Stritter, Benjamin
    2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2016), 2016, : 242 - 253
  • [46] Smartcard firewalls revisited
    Poehls, Henrich C.
    Posegga, Joachim
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 179 - 191
  • [47] System insecurity - Firewalls
    Desal, Mayur S.
    Richards, Thomas C.
    Von der Embse, Thomas
    Information Management and Computer Security, 2002, 10 (2-3): : 135 - 139
  • [48] Firewalls: An expert roundtable
    Anderson, JP
    Brand, S
    Gong, L
    Haigh, T
    Lipner, S
    Lunt, T
    Nelson, R
    Neugent, W
    Orman, H
    Ranum, M
    Schell, R
    Spafford, E
    IEEE SOFTWARE, 1997, 14 (05) : 60 - 66
  • [49] On firewalls evaluation criteria
    Noureldien, NA
    Osman, IM
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B104 - B110
  • [50] The spectrum of modern firewalls
    Nacht, M
    COMPUTERS & SECURITY, 1998, 17 (01) : 54 - 56