Handling anomalies in distributed firewalls

被引:0
|
作者
Bouhoula, Adel [1 ]
Trabelsi, Zouheir
机构
[1] Ecole Super Commun Tunis, Cite Technologies Commun, Tunis 2083, Tunisia
[2] United Arab Emirates Univ, Coll Informat Technol, Al Ain 17555, U Arab Emirates
关键词
distributed firewall; filtering rules; anomalies; security policy; inference system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Firewalls filter the incoming and outgoing network traffic based on a set of predefined filtering rules. The filtering rules have to be well defined and coherent in order to guarantee the desired responses of the Firewalls. In this paper, we propose an inference system for detecting all anomalies that could exist in a multi-Firewall network environment. Three classes of anomalies are described, namely, the Redundancy, Locking and Incoherence anomalies. Then, we give an example of common network architecture with the corresponding filtering policy. The example demonstrates how anomalies can be easily detected using the proposed inference model. Related works are discussed; and it will be demonstrated that the proposed inference model is more simple and general than related models.
引用
收藏
页码:237 / 241
页数:5
相关论文
共 50 条
  • [31] An ARAR-Tree-Based Diagnosis Mechanism for Rule Anomalies Among Internet Firewalls
    Chao, Chi-Shih
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNOLOGIES AND ENGINEERING SYSTEMS (ICITES2014), 2016, 345 : 175 - 181
  • [32] Firewalls
    Mutze, M
    WIRTSCHAFTSINFORMATIK, 1996, 38 (06): : 625 - 628
  • [33] Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model
    Mukkapati, Naveen
    Bhargavi, Ch. V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (05): : 94 - 99
  • [34] DISTRIBUTED MULTIMEDIA INFORMATION HANDLING
    MOELLER, E
    SCHELLER, A
    SCHURMANN, G
    COMPUTER COMMUNICATIONS, 1990, 13 (04) : 232 - 242
  • [35] Distributed error handling and HRI
    Zimmel, BC
    Long, MT
    Carlson, J
    Murphy, RR
    2004 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, VOLS 1- 5, PROCEEDINGS, 2004, : 1874 - 1881
  • [36] Certificate-based distributed firewalls for secure e-commerce transactions
    Djordjevic, I
    Phillips, C
    JOURNAL OF THE INSTITUTION OF BRITISH TELECOMMUNICATIONS ENGINEERS, 2001, 2 : 14 - 19
  • [37] Situation views: Getting started handling anomalies
    Thronesbery, C
    Schreckenghost, D
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 750 - 755
  • [38] Evaporating firewalls
    Van Raamsdonk, Mark
    JOURNAL OF HIGH ENERGY PHYSICS, 2014, (11): : 1 - 16
  • [39] Transcompiling Firewalls
    Bodei, Chiara
    Degano, Pierpaolo
    Focardi, Riccardo
    Galletta, Letterio
    Tempesta, Mauro
    PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 : 303 - 324
  • [40] VERIFICATION OF DISTRIBUTED FIREWALLS CONFIGURATION VS. SECURITY POLICIES USING ALCQI(D)
    Khakpour, Narges
    Jalili, Saeed
    APPLIED ARTIFICIAL INTELLIGENCE, 2009, 23 (10) : 945 - 975