DocumentCode :
558705
Title :
On synthesizing distributed firewall configurations considering risk, usability and cost constraints
Author :
Zhang, Bin ; Al-Shaer, Ehab
Author_Institution :
Sch. of Comput., DePaul Univ., Chicago, IL, USA
fYear :
2011
fDate :
24-28 Oct. 2011
Firstpage :
1
Lastpage :
8
Abstract :
Firewalls are the most deployed security devices in computer networks. Nevertheless, designing and configuring distributed firewalls, which include determining access control rules and device placement in the network, is still a significantly complex task as it requires balancing between connectivity requirements and the inherent risk and cost. Formal approaches that allow for investigating distributed firewall configuration space systematically are highly needed to optimize decision support under multiple design constraints. The objective of this paper is to automatically synthesize the implementation of distributed filtering architecture and configuration that will minimize security risk while considering connectivity requirements, user usability and budget constraints. Our automatic synthesis generates not only the complete rule configuration for each firewall to satisfy risk and connectivity constraints, but also the optimal firewall placement in the networks to minimizes spurious traffic. We define fine-grain risk, usability and cost metrics tunable to match business requirements, and formalize the configuration synthesis as an optimization problem. We then show that distributed firewall synthesis is an NP-hard problem and provide heuristic approximation algorithms. We implemented our approach in a tool called FireBlanket that were rigorously evaluated under different network sizes, topologies and budget requirements. Our evaluation study shows that the results obtained by FireBlanket are close to the theoretical lower bound and the performance is scalable with the network size.
Keywords :
authorisation; computational complexity; computer network security; filtering theory; greedy algorithms; FireBlanket tool; NP-hard problem; access control rule; automatic synthesis; budget constraints; business requirements; computer network; connectivity requirement; cost metrics; decision support; distributed filtering architecture; distributed filtering configuration; distributed firewall configuration; fine-grain risk; firewall rule configuration; greedy approximation algorithm; heuristic approximation algorithm; network firewall placement; security device; security risk minimization; spurious traffic minimization; user usability; Approximation algorithms; Business; Fires; Heuristic algorithms; Network topology; Security; Usability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network and Service Management (CNSM), 2011 7th International Conference on
Conference_Location :
Paris
Print_ISBN :
978-1-4577-1588-4
Electronic_ISBN :
978-3-901882-44-9
Type :
conf
Filename :
6103995
Link To Document :
بازگشت