Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Cross-Domain Search for Policy Anomalies in Firewall

by G.vanikalyani, P.avinash, P.pandarinath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 6
Year of Publication: 2014
Authors: G.vanikalyani, P.avinash, P.pandarinath
10.5120/18205-9337

G.vanikalyani, P.avinash, P.pandarinath . Cross-Domain Search for Policy Anomalies in Firewall. International Journal of Computer Applications. 104, 6 ( October 2014), 20-24. DOI=10.5120/18205-9337

@article{ 10.5120/18205-9337,
author = { G.vanikalyani, P.avinash, P.pandarinath },
title = { Cross-Domain Search for Policy Anomalies in Firewall },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 6 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number6/18205-9337/ },
doi = { 10.5120/18205-9337 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:28.738228+05:30
%A G.vanikalyani
%A P.avinash
%A P.pandarinath
%T Cross-Domain Search for Policy Anomalies in Firewall
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 6
%P 20-24
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of the business services have been performing very effectively by using some of the evolving technologies like cloud computing and other architectures etc. But still they have been suffering from security problems due to the undesired actions in their services. So, in this situation firewalls can plays a vital role. Firewalls can ensure the security of private networks in organizations by providing some of the security related mechanisms. So, in this paper major and latest developments have been made in anomaly management framework which works on a rule-based segmentation technique for correct detection of anomalies [1] and for the effective anomaly resolution and this can also be extended to the other types of policies

References
  1. E. Al-Shaer and H. Hamed, "Discovery of Policy Anomalies in Distributed Firewalls," IEEE INFOCOM '04, vol. 4, pp. 2605-2616, 2004
  2. Fei Chen, Bezwada Bruhadeshwar, and Alex X. Liu," Cross-Domain Privacy-Preserving Cooperative Firewall Optimization" IEEE/ACM Transactions on Networking vol. 21,, no. 3, June 2013.
  3. L. Qiu, G. Varghese, and S. Suri, "Fast Firewall Implementations for Soft-ware and Hardware-Based Routers," Proc. 9th Int'l. Conf. Network Protocols (ICNP 2001), Nov. 2001.
  4. Wool, "Trends in Firewall Configuration Errors" IEEE Internet Computing, vol. 14, no. 4, pp. 58-65, July/Aug. 2010.
  5. Hari et al. (2000); Epstein and Muthukrishnan (2001); Moffett and Sloman (1994); "conflict detection and resolution "Baboescu and Varghese (2002).
  6. L. Yuan, H. Chen, Eha, J. Mai, C. Chuah, Z. Su, P. Mohapatra, and C. Davis, "Fireman: A Toolkit for Firewall Modelling and Analysis," Proc. IEEE Symp. Security and Privacy, p. 15, 2006
  7. Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi, "Simultaneous Analysis of Time and Space for Conflict Detection in Time-Based Firewall Policies", 978-0-7695-4108-2/10 $26. 00 © 2010 IEEE
  8. S. Cobb, "ICSA Firewall Policy Guide v2. 0," NCSA Security White Paper Series, 1997.
  9. J. Wack, K. Cutler, and J. Pole, "Guidelines on Firewalls and Firewall Policy," NIST Recommendations, SP 800-41, Jan. 2002.
  10. Proc 2000 IEEE Symp. "Security and Privacy for protecting the firewall policies: May 2000.
  11. Yuan, C. Chua, and P. Mohapatra,"ProgME: Towards Programmable Network.
  12. G. Misherghi, L. Yuan, Z. Su, C. -N. Chuah, and H. Chen, "A General Framework for Benchmarking Firewall Optimization Techniques," IEEE Trans. Network and Service Management, vol. 5,no. 4, pp. 227-238, Dec. 2008
  13. Mohamed Taibah, Ehab Al-Shaer and Hazem Hamed School of Computer Science, Telecommunications and Information Systems DePaul University, Chicago, USA "Dynamic Response in Distributed Firewall Systems"
  14. Frederic Cuppens, Nora Cuppens-Boulahia†, and Joaqu´?nGarc´?a-Alfaro "Detection of Network Security Component Misconfiguration by Rewriting and Correlation"
Index Terms

Computer Science
Information Sciences

Keywords

Anomalies Firewall Policy Security