Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Cross-Domain Search for Policy Anomalies in Firewall

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 6
Year of Publication: 2014
Authors:
G. Vanikalyani
P. Avinash
P. Pandarinath
10.5120/18205-9337

G.vanikalyani, P.avinash and P.pandarinath. Article: Cross-Domain Search for Policy Anomalies in Firewall. International Journal of Computer Applications 104(6):20-24, October 2014. Full text available. BibTeX

@article{key:article,
	author = {G.vanikalyani and P.avinash and P.pandarinath},
	title = {Article: Cross-Domain Search for Policy Anomalies in Firewall},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {6},
	pages = {20-24},
	month = {October},
	note = {Full text available}
}

Abstract

Most of the business services have been performing very effectively by using some of the evolving technologies like cloud computing and other architectures etc. But still they have been suffering from security problems due to the undesired actions in their services. So, in this situation firewalls can plays a vital role. Firewalls can ensure the security of private networks in organizations by providing some of the security related mechanisms. So, in this paper major and latest developments have been made in anomaly management framework which works on a rule-based segmentation technique for correct detection of anomalies [1] and for the effective anomaly resolution and this can also be extended to the other types of policies

References

  • E. Al-Shaer and H. Hamed, "Discovery of Policy Anomalies in Distributed Firewalls," IEEE INFOCOM '04, vol. 4, pp. 2605-2616, 2004
  • Fei Chen, Bezwada Bruhadeshwar, and Alex X. Liu," Cross-Domain Privacy-Preserving Cooperative Firewall Optimization" IEEE/ACM Transactions on Networking vol. 21,, no. 3, June 2013.
  • L. Qiu, G. Varghese, and S. Suri, "Fast Firewall Implementations for Soft-ware and Hardware-Based Routers," Proc. 9th Int'l. Conf. Network Protocols (ICNP 2001), Nov. 2001.
  • Wool, "Trends in Firewall Configuration Errors" IEEE Internet Computing, vol. 14, no. 4, pp. 58-65, July/Aug. 2010.
  • Hari et al. (2000); Epstein and Muthukrishnan (2001); Moffett and Sloman (1994); "conflict detection and resolution "Baboescu and Varghese (2002).
  • L. Yuan, H. Chen, Eha, J. Mai, C. Chuah, Z. Su, P. Mohapatra, and C. Davis, "Fireman: A Toolkit for Firewall Modelling and Analysis," Proc. IEEE Symp. Security and Privacy, p. 15, 2006
  • Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi, "Simultaneous Analysis of Time and Space for Conflict Detection in Time-Based Firewall Policies", 978-0-7695-4108-2/10 $26. 00 © 2010 IEEE
  • S. Cobb, "ICSA Firewall Policy Guide v2. 0," NCSA Security White Paper Series, 1997.
  • J. Wack, K. Cutler, and J. Pole, "Guidelines on Firewalls and Firewall Policy," NIST Recommendations, SP 800-41, Jan. 2002.
  • Proc 2000 IEEE Symp. "Security and Privacy for protecting the firewall policies: May 2000.
  • Yuan, C. Chua, and P. Mohapatra,"ProgME: Towards Programmable Network.
  • G. Misherghi, L. Yuan, Z. Su, C. -N. Chuah, and H. Chen, "A General Framework for Benchmarking Firewall Optimization Techniques," IEEE Trans. Network and Service Management, vol. 5,no. 4, pp. 227-238, Dec. 2008
  • Mohamed Taibah, Ehab Al-Shaer and Hazem Hamed School of Computer Science, Telecommunications and Information Systems DePaul University, Chicago, USA "Dynamic Response in Distributed Firewall Systems"
  • Frederic Cuppens, Nora Cuppens-Boulahia†, and Joaqu´?nGarc´?a-Alfaro "Detection of Network Security Component Misconfiguration by Rewriting and Correlation"