• DocumentCode
    2808988
  • Title

    Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets

  • Author

    Pozo, S. ; Ceballos, R. ; Gasca, R.M. ; Varela-Vaca, A.J.

  • Author_Institution
    Dept. of Comput. Languages & Syst., Seville Univ., Sevilla
  • fYear
    2008
  • fDate
    25-31 Aug. 2008
  • Firstpage
    53
  • Lastpage
    61
  • Abstract
    Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied or vice versa. In this paper, we analyze the inconsistency characterization problem as a separate problem of the diagnosis one, and propose formal definitions in order to characterize one-to- many inconsistencies. We identify the combinatorial part of the problem that generates exponential complexities in combined diagnosis and characterization algorithms proposed by other authors. Then we propose a decomposition of the combinatorial problem in several smaller combinatorial ones, which can effectively reduce the complexity of the problem. Finally, we propose an approximate heuristic and algorithms to solve the problem in worst case polynomial time. Although many algorithms have been proposed to address this problem, all of them are combinatorial. The presented algorithms are an heuristic way to solve the problem with polynomial complexity. There are no constraints on how rule field ranges are expressed.
  • Keywords
    authorisation; combinatorial mathematics; polynomials; access control list; combinatorial problem decomposition; diagnosis algorithms; exponential complexities; firewall rule sets; inconsistency characterization; polynomial complexity; polynomial heuristic algorithms; Access control; Computer languages; Computer security; Fault detection; Fault diagnosis; Heuristic algorithms; Information security; Polynomials; Protocols; TCPIP;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Emerging Security Information, Systems and Technologies, 2008. SECURWARE '08. Second International Conference on
  • Conference_Location
    Cap Esterel
  • Print_ISBN
    978-0-7695-3329-2
  • Electronic_ISBN
    978-0-7695-3329-2
  • Type

    conf

  • DOI
    10.1109/SECURWARE.2008.39
  • Filename
    4622561