Design and Implementation for the Firewall Policy Analysis and Configuration Tools

Article Preview

Abstract:

The firewall is one of the most important network security facility and is widely used as a base infrastructure in a large enterprise network. When policy changes, the administrator must find all the potential conflicts between existing policies to ensure network security. That's a waste of time and energy. Proceeding from the demands, this paper analyzes key points and difficulties in the design process for the tools, applies mature algorithm of policy conflict detection, and finally proposes a flexible and scalable design. The prototype system proves that the tool does effectively detect all conflicts in policy set, and in the form of reports for the administrator.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1597-1602

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu Jun-jun, Liang Jian-wu. 2008. Adescription method for firewall policy based on decision tree, Microcomputer information, pp.223-224.

Google Scholar

[2] Liang Jian-wu, Long Xiao-mei, Liu Jun-jun. 2010. Detection algorithm for firewall policy based on LE-Trie, Computer Engineering, pp.134-136.

Google Scholar

[3] Laskshman T V, Stidialis D. 1998. High speed policy based packet forwarding using efficient multi dimensional range matching" Proceddings of ACM sigcomm, 98. Canada: Computer communication Review, 1998: 203-214.

DOI: 10.1145/285243.285283

Google Scholar

[4] Gupta P, McKeown N. 2001. Algorithms for packet classification errors, IEEE Network, 2001, 15(2): 24-43.

DOI: 10.1109/65.912717

Google Scholar

[5] GOUDA M, LIU X. 2004. Firewall design: Consistency, Completeness, and Compactness, Proceedings of the 24th IEEE International Conference on Distributed Computing Systems(ICDCS 04), 2004, 3.

DOI: 10.1109/icdcs.2004.1281597

Google Scholar

[6] Wool A. 2004. A quantitative study of firewall configuration errors, IEEE Computer society 2004, 37(6): 62-67.

DOI: 10.1109/mc.2004.2

Google Scholar

[7] Zhang Zhao-li, Hong Fan, Xiao Hai-jun. 2007. A detection method for policy conflict, Computer engineering and applications. pp.111-113.

Google Scholar