2011 13th Asia-Pacific Network Operations and Management Symposium 2011
DOI: 10.1109/apnoms.2011.6077012
|View full text |Cite
|
Sign up to set email alerts
|

A flexible and feasible anomaly diagnosis system for Internet firewall rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Another relevant classes of related work about the topic of firewall anomaly analysis is composed of studies ( [27], [28], [29], [30], [31], [32], [33], [34]) that propose platforms based on Graphic User Interfaces (GUIs), which provide functionalities such as zooming and manual adjustment of the firewall filtering effect areas to help human administrators to identify firewall policy anomalies. Specifically, Tran et al [27] propose PolicyVis, a 2D graphic interface that allows a thorough visualization of all possible firewall behaviors by considering all rules fields, actions and orders.…”
Section: A Firewall Policy Anomaly Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Another relevant classes of related work about the topic of firewall anomaly analysis is composed of studies ( [27], [28], [29], [30], [31], [32], [33], [34]) that propose platforms based on Graphic User Interfaces (GUIs), which provide functionalities such as zooming and manual adjustment of the firewall filtering effect areas to help human administrators to identify firewall policy anomalies. Specifically, Tran et al [27] propose PolicyVis, a 2D graphic interface that allows a thorough visualization of all possible firewall behaviors by considering all rules fields, actions and orders.…”
Section: A Firewall Policy Anomaly Analysismentioning
confidence: 99%
“…PolicyVis is flexible enough to let users choose their desired fields as 2D graph coordinates, and eases the anomaly analysis operation introducing the features of compressing, focusing, zooming, and segmentation. Chao [28] creates a systematic visualization for the firewall Rule Anomaly Relation tree (RAR tree) that is created on the basis of the investigated firewall rules. Callouts, arrays and other graphical symbols are used to depict intuitively the presence of anomalies, and a specific GUI view is employed to categorize them.…”
Section: A Firewall Policy Anomaly Analysismentioning
confidence: 99%
“…Two fuzzy variables including «Low» and «High» are used to describe both the receive rate counter r A and the rejection rate r R . The result of the fuzzy system is the computed rate r C , which characterizes the rate of rejection and acceptance in packet traffic and is described by three fuzzy variables, including High Rejec-tion, Equal, and High Accept [11]. Figure 4 shows packet filtering rules flowcharts (Second level).…”
Section: Fig 2 Two-level Fuzzy Packet Filtering Modelmentioning
confidence: 99%