DocumentCode :
3049758
Title :
Security Analysis of Firewall Rule Sets in Computer Networks
Author :
Khan, Bilal ; Khan, Muhammad Khurram ; Mahmud, Maqsood ; Alghathbar, Khaled S.
Author_Institution :
Center of Excellence in Inf. Assurance (CoEIA), King Saud Univ., Riyadh, Saudi Arabia
fYear :
2010
fDate :
18-25 July 2010
Firstpage :
51
Lastpage :
56
Abstract :
Firewalls are the screening gates for the internet/intranet traffic in computer networks. However, deploying a firewall is simply not enough since it needs to be configured by the system administrator according to the needs of the organization. There are many reasons due to which it is hard for the administrator to configure the firewall properly. Specifying firewall rule set is complicated and error prone. Once the firewall rules are defined, then firewall should be tested, whether it actually implements firewall policy. In this paper, one of the approaches of the firewall rule set analysis, i.e., the problems with the structure of the firewall rule set is being addressed. The structure of a sample firewall rule set is analyzed to detect and resolve conflicts using two structural analysis methodologies, i.e., Policy Tree and Relational Algebra. Then the results obtained from the test by using an automated tool PolicyVisor, based on the policy tree methodology, are analyzed. It is found from the analysis that even a set of only six rules has number of anomalies. Moreover, it is hard for the human to find such anomalies manually in a larger rule set and failure to find such anomalies leads to change the firewall policy.
Keywords :
authorisation; computer network security; relational algebra; trees (mathematics); PolicyVisor; computer network security analysis; firewall rule set; policy tree methodology; relational algebra; structural analysis methodology; Algebra; Correlation; Fires; Organizations; Protocols; Redundancy; Security; Analysis; Firewall; Policy Tree; PolicyVisor; Relational Algebra; Rule Set;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on
Conference_Location :
Venice
Print_ISBN :
978-1-4244-7517-9
Electronic_ISBN :
978-0-7695-4095-5
Type :
conf
DOI :
10.1109/SECURWARE.2010.16
Filename :
5633629
Link To Document :
بازگشت