Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
DOI: 10.1109/secpri.2000.848455
|View full text |Cite
|
Sign up to set email alerts
|

Fang: a firewall analysis engine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
126
0
2

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 172 publications
(128 citation statements)
references
References 2 publications
0
126
0
2
Order By: Relevance
“…However, it takes only one firewall into account for the process. In [15] and [17] a method and tool to discover and test a network security policy is proposed. The configuration files along with the description of the network topology are used to build an internal representation of the policy that can be verified by the user through queries in ad-hoc languages.…”
Section: Related Workmentioning
confidence: 99%
“…However, it takes only one firewall into account for the process. In [15] and [17] a method and tool to discover and test a network security policy is proposed. The configuration files along with the description of the network topology are used to build an internal representation of the policy that can be verified by the user through queries in ad-hoc languages.…”
Section: Related Workmentioning
confidence: 99%
“…Several studies have been conducted toward audit mechanisms that analyze already deployed configurations, with the goal of signaling inconsistencies and fixing the discovered anomalies. We can classify them into three categories: (I) those that are oriented towards directly querying the firewall itself [14][15][16], (II) those targeting conflict management [17,18] and (III) those focusing on the detection of anomalies [19,4,2,20,21]. In category I, the analysis problem is relayed towards a process of information retrieval by directly querying the firewall.…”
Section: Related Workmentioning
confidence: 99%
“…We can look at three rules that aim at granting authorization to FTP services, both in active and passive mode: de configurations existantes. Nous pouvons les classer dans trois catégories : (I) ceux orientés interrogation du pare-feu [14,15] ou [16], (II) ceux ciblant la gestion de conflits [17,18] et (III) ceux se focalisant sur la détection des anomalies [19,4,2,20,21]. Dans la catégorie I, la problématique d'analyse a été réorientée vers un processus de recherche d'information en interrogeant le pare-feu, ce qui déplace la difficulté vers la structuration des configurations, le langage de requêtes, l'exhaustivité et l'efficacité de ces requêtes, le besoin de mettre en vis-à-vis la politique souhaitée et les règles de filtrage ce qui rend l'analyse complexe, sujette aussi bien à des faux positifs qu'à des faux négatifs puisque la dimension histoire n'est pas prise en compte.…”
Section: Handling Inter-state Rule Anomaliesunclassified
“…Mayer et al present tools for analyzing firewalls in [13]. In [8], Eronen et al propose the approach of representing the rules as a knowledge base, and present a tool based on Constraint Logic Programming to allow the user to write higher level operations and queries.…”
Section: Introductionmentioning
confidence: 99%