DocumentCode
558705
Title
On synthesizing distributed firewall configurations considering risk, usability and cost constraints
Author
Zhang, Bin ; Al-Shaer, Ehab
Author_Institution
Sch. of Comput., DePaul Univ., Chicago, IL, USA
fYear
2011
fDate
24-28 Oct. 2011
Firstpage
1
Lastpage
8
Abstract
Firewalls are the most deployed security devices in computer networks. Nevertheless, designing and configuring distributed firewalls, which include determining access control rules and device placement in the network, is still a significantly complex task as it requires balancing between connectivity requirements and the inherent risk and cost. Formal approaches that allow for investigating distributed firewall configuration space systematically are highly needed to optimize decision support under multiple design constraints. The objective of this paper is to automatically synthesize the implementation of distributed filtering architecture and configuration that will minimize security risk while considering connectivity requirements, user usability and budget constraints. Our automatic synthesis generates not only the complete rule configuration for each firewall to satisfy risk and connectivity constraints, but also the optimal firewall placement in the networks to minimizes spurious traffic. We define fine-grain risk, usability and cost metrics tunable to match business requirements, and formalize the configuration synthesis as an optimization problem. We then show that distributed firewall synthesis is an NP-hard problem and provide heuristic approximation algorithms. We implemented our approach in a tool called FireBlanket that were rigorously evaluated under different network sizes, topologies and budget requirements. Our evaluation study shows that the results obtained by FireBlanket are close to the theoretical lower bound and the performance is scalable with the network size.
Keywords
authorisation; computational complexity; computer network security; filtering theory; greedy algorithms; FireBlanket tool; NP-hard problem; access control rule; automatic synthesis; budget constraints; business requirements; computer network; connectivity requirement; cost metrics; decision support; distributed filtering architecture; distributed filtering configuration; distributed firewall configuration; fine-grain risk; firewall rule configuration; greedy approximation algorithm; heuristic approximation algorithm; network firewall placement; security device; security risk minimization; spurious traffic minimization; user usability; Approximation algorithms; Business; Fires; Heuristic algorithms; Network topology; Security; Usability;
fLanguage
English
Publisher
ieee
Conference_Titel
Network and Service Management (CNSM), 2011 7th International Conference on
Conference_Location
Paris
Print_ISBN
978-1-4577-1588-4
Electronic_ISBN
978-3-901882-44-9
Type
conf
Filename
6103995
Link To Document