Paper Title:
Rule Anomalies Detection in Firewalls
  Abstract

Firewall is the most prevalent and important technique to enforce the security inside the networks. However, effective and free anomalies rules management in large and fast growing networks becomes increasingly challenging. In this paper, we use a directed tree-based method to detect rule anomalies in firewall; in addition, this method can track the source of the anomalies. We believe the posed information will simplify the rules management and minimizing the networking vulnerability due to firewall rules misconfigurations.

  Info
Periodical
Key Engineering Materials (Volumes 474-476)
Edited by
Garry Zhu
Pages
822-827
DOI
10.4028/www.scientific.net/KEM.474-476.822
Citation
X. J. Liao, Y. Wang, H. Lu, "Rule Anomalies Detection in Firewalls", Key Engineering Materials, Vols. 474-476, pp. 822-827, 2011
Online since
April 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yuan Bai, Zhong Ying Bai
Abstract:Based on analysis of relative and absolute traffic anomalies a fully DIDS(Distributed Intrusion Detection System) is built to detect and...
790
Authors: Ding De Jiang, Cheng Yao, Zheng Zheng Xu, Peng Zhang, Zhen Yuan, Wen Da Qin
Abstract:Anomalous traffic often has a significant impact on network activities and lead to the severe damage to our networks because they usually are...
2098
Authors: Ying Liang, Qing Yang Xu
Chapter 7: Detection, Monitoring and Measurements
Abstract:The suitability evaluation has an important influence on suitable-matching region selection of geomagnetism matching navigation. Geomagnetic...
994
Authors: Shu Hua Ma, Jin Kuan Wang, Zhi Gang Liu, Hou Yan Jiang
Chapter 1: Applied Mechanics and Measurement Technology of Detection and Monitoring
Abstract:Data measured and collected by WSNs is often unreliable and a big amount of anomaly data exist. Detecting these anomaly in energy-constrained...
226