Title : 
Algorithms for verifying firewall and router access lists
         
        
        
            Author_Institution : 
Dept. of Comput. Sci. & Eng., Slovak Univ. of Technol., Bratislava, Slovakia
         
        
        
        
        
        
            Abstract : 
Security in computer networks is a very complex task with various requirements. The network security policy that describes these security requirements is primarily presented in a high-level form. Also, the security policy is enforced using some low-level security mechanisms; mainly firewall technology. This paper presents a new algorithm for verifying the equivalence between the high-level security policy and the corresponding low-level firewall rule-base. This verification ensures that there is no security hole. Also, it ensures that there is no missed low-level rule which may lead to unstable and unconvinced usage of the network.
         
        
            Keywords : 
access control; authorisation; computer networks; telecommunication security; computer network security; firewall technology; high-level security policy; low-level firewall rule-base; low-level security mechanism; network security policy; router access list; Access control; Computer networks; Computer science; Computer security; Data security; Electronic mail; Matrix converters; Network servers; Protocols;
         
        
        
        
            Conference_Titel : 
Circuits and Systems, 2003 IEEE 46th Midwest Symposium on
         
        
        
            Print_ISBN : 
0-7803-8294-3
         
        
        
            DOI : 
10.1109/MWSCAS.2003.1562330