NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium 2020
DOI: 10.1109/noms47738.2020.9110399
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning

Abstract: Firewalls have been widely used to protect not only small and local networks but also large enterprise networks. The configuration of firewalls is mainly done by network administrators, thus, it suffers from human errors. This paper aims to solve the network administrators' problem by introducing a formal approach that helps to configure centralized and distributed firewalls and automatically generate conflict-free firewall rules. We propose a novel framework, called ArgoFiCo, which is based on argumentation r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…The introduced tool is based on a formal framework, called ArgoFiCo that uses abduction and argumentation reasoning. The theoretical formalism used by ArgoFiCo is introduced in Section 3.1 and a brief introduction of Ar-goFiCo's preliminary results on the firewalls' configuration problem are given in [17].…”
Section: Automatic Firewalls' Configurationmentioning
confidence: 99%
“…The introduced tool is based on a formal framework, called ArgoFiCo that uses abduction and argumentation reasoning. The theoretical formalism used by ArgoFiCo is introduced in Section 3.1 and a brief introduction of Ar-goFiCo's preliminary results on the firewalls' configuration problem are given in [17].…”
Section: Automatic Firewalls' Configurationmentioning
confidence: 99%
“…A firewall should have the following features in order to be functional; spoofing protection, user authentication, bandwidth control, network address encryption, data encryption and digital signature [2]. While configuring a network, network administrators make the decisions of configuring the firewall and these can bring challenges [5]. Human beings tend to make errors.…”
Section: Introductionmentioning
confidence: 99%