2006
DOI: 10.1007/11907466_16
|View full text |Cite
|
Sign up to set email alerts
|

Using Argumentation Logic for Firewall Policy Specification and Analysis

Abstract: Abstract. Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that network administrators have tools to translate their security requirements into firewall configuration rules and ensure that these rules are consistent with each other. In this paper we propose an approach to firewall policy specification and analysis that uses a formal framework fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(24 citation statements)
references
References 9 publications
0
23
0
1
Order By: Relevance
“…This is observed by Hari et al (2000), Hamed (2003, 2004a,b), Al-Shaer et al (2005) and Bandara et al (2006b), as the algorithms developed depend on some sort of implicit knowledge of the target managed system, for example, that the policies are ordered and only one in a set is enforced. This approach can be very ecient for centralised applications, but may not scale to distributed systems without augmenting the algorithms .…”
Section: Discussionmentioning
confidence: 90%
See 1 more Smart Citation
“…This is observed by Hari et al (2000), Hamed (2003, 2004a,b), Al-Shaer et al (2005) and Bandara et al (2006b), as the algorithms developed depend on some sort of implicit knowledge of the target managed system, for example, that the policies are ordered and only one in a set is enforced. This approach can be very ecient for centralised applications, but may not scale to distributed systems without augmenting the algorithms .…”
Section: Discussionmentioning
confidence: 90%
“…Another approach to the problem, proposed by Bandara et al (2006b), is to encode the rewall policies into a logic programming language and to use AI techniques to search for policy anomalies. They represent a rewall policy as a logic statement in Prolog (a logic programming language).…”
Section: Language Based Policy Conict Analysismentioning
confidence: 99%
“…It relieves the network administrators and help to automate the management tasks. In [15] and [16] ontologies are applied to describe the network policies such as firewall policies. Management of complex 5G networks using ontologies is proposed in [17].…”
Section: Ontology-based Network Managementmentioning
confidence: 99%
“…[8] described a technique based on Argumentation for Logic Programming with Priorities, allowing administrators to use high-level abstractions in specifying their network security requirements. In [9], this work was extended to automatically generate firewall policies from higher-level requirements; and in previous work, we [6,42] have discussed how to use argumentation to handle firewall anomalies and, more generally, to address cyber-security.…”
Section: Related Workmentioning
confidence: 99%