2012
DOI: 10.1007/978-3-642-30436-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Handling Stateful Firewall Anomalies

Abstract: Abstract. A security policy consists of a set of rules designed to protect an information system. To ensure this protection, the rules must be deployed on security components in a consistent and non-redundant manner. Unfortunately, an empirical approach is often adopted by network administrators, to the detriment of theoretical validation. While the literature on the analysis of configurations of first generation (stateless) firewalls is now rich, this is not the case for second and third generation firewalls,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…The literature on the evaluation of first generation FW configurations is now significantly abundant, but the same cannot be said for second and third generation FWs, also referred to as stateful FWs. Cuppens addressed this disadvantage and provided solutions for analyzing and tackling stateful FW anomalies and misconfigurations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The literature on the evaluation of first generation FW configurations is now significantly abundant, but the same cannot be said for second and third generation FWs, also referred to as stateful FWs. Cuppens addressed this disadvantage and provided solutions for analyzing and tackling stateful FW anomalies and misconfigurations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are several works in the literature that propose anomaly detection techniques for firewall policies [1], [2], [22], [41]. However, these works consider network firewall policies and do not repair WAFs regex rules.…”
Section: Related Workmentioning
confidence: 99%
“…In the context of WAF testing, most of research effort has been devoted to generating attacks able to bypass WAFs using various automated testing approaches [1], [2], [4], [22], [41]. While identifying security flaws helps highlight the inadequacy of existing configurations, little attention has been paid to supporting the refinement of inadequate rule sets.…”
Section: Introductionmentioning
confidence: 99%
“…This classification had been improved and IDS were introduced in [2]. Also, there was a considerable amount of work on detecting misconfiguration in IPSec tunnels, firewalls and IDS ( [3], [7] and [15]). These models represent the reality faithfully.…”
Section: Related Workmentioning
confidence: 99%