2007
DOI: 10.1007/978-3-540-74827-4_19
|View full text |Cite
|
Sign up to set email alerts
|

Security Policies Tuning Among IP Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Hari et al [7] aim at detecting if firewall rules are correlated to each other, while in [8,9] a set of techniques and algorithms are defined to detect all policy conflicts. Along this line, [10] and [11] provide an automatic conflict resolution algorithm for a single firewall and a tuning algorithm for multiple cooperating firewalls, respectively.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Hari et al [7] aim at detecting if firewall rules are correlated to each other, while in [8,9] a set of techniques and algorithms are defined to detect all policy conflicts. Along this line, [10] and [11] provide an automatic conflict resolution algorithm for a single firewall and a tuning algorithm for multiple cooperating firewalls, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…. , ( V) (10) Extract rules from "deny all" (11) Optimize rule list of device dev (12) Evaluate percentage Cost Reduction pCR (13) if ≥ 3 then (14) Upload optimized rule list into device dev (15) end if (16) end if (17) end if (18) (…”
Section: Traffic Driven Adaptation Of Acomentioning
confidence: 99%
See 1 more Smart Citation
“…In [1] the Authors only aim at detecting if firewall rules are correlated to each other, while in [2][3][4] a set of techniques and algorithms are defined to discover all of the possible policy conflicts. Along this line, [5] and [6] provide an automatic conflict resolution algorithm in single firewall environment and tuning algorithm in multi-firewall environment respectively. Recently great emphasis has been placed on how to optimize firewall performance.…”
Section: Related Workmentioning
confidence: 99%
“…Our analysis shows how shaping access list based on network traffic can often results in conflicts between policies. As reported by many authors [1][2][3][4][5][6], conflicts in a policy can cause holes in security, and often they can be hard to find when performing only visual or manual inspection. In this paper we propose architecture based on our algorithm to automatically adapt packet filtering devices configuration to traffic behavior achieving the best performance ensuring conflict-free solution.…”
Section: Introductionmentioning
confidence: 99%