2005
DOI: 10.1007/s10207-005-0074-z
|View full text |Cite
|
Sign up to set email alerts
|

Offline firewall analysis

Abstract: Practically every corporation that is connected to the Internet has at least one firewall, and often many more. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. Therefore, testing, auditing, or reverse-engineering existing firewall configurations are important components of every corporation's network security practice. Unfortunately, this is easier said than done. Firewall configuration files are written in notoriously hard to read languages,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(38 citation statements)
references
References 12 publications
0
38
0
Order By: Relevance
“…A number of existing techniques can be used to generate [7,13,14], query [15,22,23] and perform structural analysis [3,4,6] on network access control configurations. However, these homogeneous firewall-centric approaches tend not consider their interoperation with other and applicationlayer access controls.…”
Section: Discussionmentioning
confidence: 99%
“…A number of existing techniques can be used to generate [7,13,14], query [15,22,23] and perform structural analysis [3,4,6] on network access control configurations. However, these homogeneous firewall-centric approaches tend not consider their interoperation with other and applicationlayer access controls.…”
Section: Discussionmentioning
confidence: 99%
“…Bartal et al [5] designed a UML like language for representing firewall policy rules which are obtained from a model compiler which translates the rules into firewall configuration files. A. Mayer et al [11] designed a tool to analyze firewall policy rules. However, the analysis is done offline i.e.…”
Section: Related Workmentioning
confidence: 99%
“…However, the need to protect organization network from internal attacks gave rise to the concept of 'Distributed Firewalls. ' The basic idea of 'Distributed Firewalls' is to make every device present in the network, a firewall that filters traffic to and from itself [11]. Firewalls, especially the packet-filtering firewalls contain certain predefined rules which form the security policy of the firewall.…”
Section: Introductionmentioning
confidence: 99%
“…This work has led to the development of a number of tools that support offline firewall policy analysis and management [10]. However, the analysis process does not detect specific anomaly types such as shadowing and redundancy.…”
Section: Related Workmentioning
confidence: 99%