DocumentCode :
1436533
Title :
Detecting and Resolving Firewall Policy Anomalies
Author :
Hu, Hongxin ; Ahn, Gail-Joon ; Kulkarni, Ketan
Author_Institution :
Security Eng. for Future Comput. (SEFCOM) Lab., Arizona State Univ., Tempe, AZ, USA
Volume :
9
Issue :
3
fYear :
2012
Firstpage :
318
Lastpage :
331
Abstract :
The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the firewall. Unfortunately, designing and managing firewall policies are often error prone due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools. In this paper, we represent an innovative policy anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions. In particular, we articulate a grid-based representation technique, providing an intuitive cognitive sense about policy anomaly. We also discuss a proof-of-concept implementation of a visualization-based firewall policy analysis tool called Firewall Anomaly Management Environment (FAME). In addition, we demonstrate how efficiently our approach can discover and resolve anomalies in firewall policies through rigorous experiments.
Keywords :
authorisation; business data processing; cognition; computer network security; data visualisation; grid computing; knowledge based systems; FAME; business services; firewall anomaly management environment; firewall policy anomaly detection; grid based representation technique; intuitive cognitive sense; private network security protection; rule-based segmentation technique; systematic analysis mechanisms; visualization based firewall policy analysis tool; Correlation; Data structures; Fires; IP networks; Redundancy; Security; Visualization; Firewall; access control; policy anomaly management; visualization tool.;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2012.20
Filename :
6143955
Link To Document :
بازگشت