Rule Anomalies Detection in Firewalls

Abstract:

Article Preview

Firewall is the most prevalent and important technique to enforce the security inside the networks. However, effective and free anomalies rules management in large and fast growing networks becomes increasingly challenging. In this paper, we use a directed tree-based method to detect rule anomalies in firewall; in addition, this method can track the source of the anomalies. We believe the posed information will simplify the rules management and minimizing the networking vulnerability due to firewall rules misconfigurations.

Info:

Periodical:

Key Engineering Materials (Volumes 474-476)

Edited by:

Garry Zhu

Pages:

822-827

DOI:

10.4028/www.scientific.net/KEM.474-476.822

Citation:

X. J. Liao et al., "Rule Anomalies Detection in Firewalls", Key Engineering Materials, Vols. 474-476, pp. 822-827, 2011

Online since:

April 2011

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.