2011 IEEE 11th International Conference on Computer and Information Technology 2011
DOI: 10.1109/cit.2011.84
|View full text |Cite
|
Sign up to set email alerts
|

A Fully Automatic Approach for Fixing Firewall Misconfigurations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Souayeh and Bouhoula [15] and Alsaleh [16] proposed methods for verifying that a firewall configuration respects the security policy it implements. Khorchani et al [17] used a modal logic, called Visibility Logic, to define arbitrary patterns between rules inside a firewall and verify any formula expressed in visibility logic using model checking.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Souayeh and Bouhoula [15] and Alsaleh [16] proposed methods for verifying that a firewall configuration respects the security policy it implements. Khorchani et al [17] used a modal logic, called Visibility Logic, to define arbitrary patterns between rules inside a firewall and verify any formula expressed in visibility logic using model checking.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, Kotenko and Polubelova [19] used model checking for the verification of firewall security policy. The approaches in [15], [18], and [19] only check for conflicts between rules which are obtained by inspecting some fields in the policy at high level of abstraction.…”
Section: Related Workmentioning
confidence: 99%
“…Formal verification has been introduced in this field by some subsequent articles ( [11], [15], [16], [17], [18]), which underlined the importance of formal correctness assurance for the automatically computed configurations. Formal verification of firewall configurations has recently become a vital requirement for critical environments, as underlined in [6].…”
Section: Automatic Firewall Configurationmentioning
confidence: 99%
“…Moreover, a further limitation of [15] is that, differently from our approach, it cannot configure generic firewall implementations, but only firewalls based on IPChains and Cisco's PIX syntax. For what concerns the other three articles ( [17], [18] and [11]), their main limitation is that they cannot configure firewalls from scratch, since they are approaches for fixing firewall misconfigurations. For this reason, they do not achieve full automation, but they require that someone provides an initial rule set.…”
Section: Automatic Firewall Configurationmentioning
confidence: 99%
See 1 more Smart Citation