Firewall Analysis with Policy-based Host Classification
نویسندگان
چکیده
For administrators of large systems, testing and debugging a firewall policy is a difficult process. The size and complexity of many firewall policies make manual inspection of the rule set tedious and error-prone. The complex interaction of conflicting rules can conceal serious errors that compromise the security of the network or interrupt the delivery of important services. Most existing tools for verifying the policy require the user to provide a detailed set of test cases or queries, which can sometimes be as difficult as verifying the policy by hand. Deriving a sufficiently comprehensive set of tests requires a detailed knowledge of potential vulnerabilities and a familiarity with the mechanics of the firewall. It also requires a significant investment of time and other resources. In this work, we present a fully automatic technique for identifying significant anomalies in a firewall policy. Our technique employs a novel system for classifying the hosts of a network into classes based on an equivalence structure, which is calculated from the firewall policy. This ‘‘policy-based classification of network hosts’’ substantially reduces the difficulty of identifying potential errors in the configuration of a firewall or group of connected firewalls and can be combined with existing firewall verification techniques to improve their effectiveness in detecting errors.
منابع مشابه
Firewall Management for to Resolve the Policy Anomalies
Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis tools, such as Firewall Policy Advisor and FIREMAN, they can only detect the policy anomaly cannot resolve these anomalies, and detection time was also increased. Therefore, I re...
متن کاملDistributed Firewall Policy Validation
With hacking attempts, the cost of security breaches, and the importance of defensive computer security in general all on the rise, strong firewalls are more relevant than ever. At the same time, demands for software diversity and increasingly complex network layouts make evaluating adherence to a unified security policy especially difficult. In this paper, I propose a method of uniformly valid...
متن کاملVisual Firewall Rule Builder
The paper that is being submitted deals primarily with the implementation of firewall technology on Linux based systems. It focuses on the features of the visual medium for the creation and management of firewall rules, Visual Firewall Rule Builder – VFRB. VFRB has been written in Java and has a modular construction. The program consists of an object-oriented graphical user interface and a poli...
متن کاملSpecialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access control and the difficult analysis and configuration to conform with corporate security policy requirements. Without the use of specialized solutions that allow effective functioning of information security systems and their ...
متن کاملA policy-based approach to firewall management
This paper describes a policy-based approach to firewall management. The Policy-Based Networking (PBN) architecture proposed by the Policy Framework Group of IETF is analysed, together with the communication protocols, policy specification languages, and the necessary information models. The paper continues with a description of an application of the PBN architecture to firewall management. The...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006