DocumentCode :
415836
Title :
Managing firewall and network-edge security policies
Author :
Al-Shaer, Ehab
Author_Institution :
DePaul Univ., Chicago, IL, USA
Volume :
1
fYear :
2004
fDate :
23-23 April 2004
Abstract :
Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network vulnerability. Therefore, in order to produce anomaly-free firewall policies when adding or modifying rules in any firewall, a thorough intra- and inter-firewall analysis is required to determine the rule location (which firewall) and position (what order in the firewall policy) in the network. We comprehensibly identify all types of anomaly that could exist in single- or multi-firewall environments. We then present a set of techniques/tools that automatically discover and rectify policy anomalies in centralized and distributed legacy firewalls.
Keywords :
authorisation; computer networks; telecommunication security; firewall policy conflicts; firewall policy management; multi-firewall enterprise networks; network vulnerability; network-edge security policy management; policy anomalies; rule location; rule position;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP
Conference_Location :
Seoul, South Korea
ISSN :
1542-1201
Print_ISBN :
0-7803-8230-7
Type :
conf
DOI :
10.1109/NOMS.2004.1317810
Filename :
1317810
Link To Document :
بازگشت