Design and Implementation of the Firewall Policy Audit Based on Improved Policy Tree

Article Preview

Abstract:

Firewall plays an important role in today's network security, and its rule configuration is reasonable or not directly related to the security of network environment. With the increasing size of the network, firewall configurations are becoming increasingly complex, and the firewall policy audit should be born in order to better play the protective properties of the firewall. Firstly, this paper studies the relationship between firewall rules in detail, analyzes some common types of rules abnormal of audit programs and reviews existing policies. Next, this paper proposes a improved audit program based on the tree structure, discusses and achieves the audit process of the program in detail. Finally, this paper shows a graphical reports and detailed audit findings of the prototype system, and does a comparison and verification between the results of the improved audit program and the traditional strategy tree.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

179-182

Citation:

Online since:

March 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Wool A. A Quantitative Study of Firewall Configuration Errors [J]. IEEE computer society, 2004, 37(06): 62-67.

DOI: 10.1109/mc.2004.2

Google Scholar

[2] Hamed H, Al-Shaer E. Dynamic Rule-Ordering Optimization for High-Speed Firewall Filtering [C] /Proceedings of the 2006 ACM Symposium on Information, computer and communications security. ACM, 2006: 332-342.

DOI: 10.1145/1128817.1128867

Google Scholar

[3] Xiaogang Wu. Anomaly Detection and Optimization Research of Firewall Configuration [D]. Guangzhou: Guangzhou University, (2007).

Google Scholar

[4] Zhaoli Zhang, Haijun Xiao, Fan Hong. A Collision Detection Algorithm of Firewall Rules [J]. Computer engineering and application, 2007, 43(15): 111-113.

Google Scholar

[5] Donghao Zhou, Yongjun Wang. Firewall Extend Match Module Matching Algorithm Optimization [J]. Computer engineering and design, 2011, 32(03): 766-769.

Google Scholar

[6] Al-SHARE E, HAMED H. Taxonomy of Conflicts in Network Security Policies [J]. Communications Magazine, IEEE, 2006, 44(03): 134-141.

DOI: 10.1109/mcom.2006.1607877

Google Scholar