2001
DOI: 10.1007/978-0-387-35413-2_18
|View full text |Cite
|
Sign up to set email alerts
|

ACLA: A Framework for Access Control List (ACL) Analysis and Optimization

Abstract: It is a challenging task for network administrators to correctly implement corporate security policies in a large network environment Much of the security policy enforcement at the network level involves configuring the packet classification strategies using Access Control List (ACL). A gateway device performing traffic filtering can deploy ACLs with thousands of rules. Due to the difficulties of ACL configuration language, large ACLs can easily become redundant, inconsistent, and difficult to optimise or even… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…This work has formalized types of conflicts in firewall policies and provided a variety of fast and efficient algorithms to detect them. Going one step further, researchers have proposed optimization algorithms to generate more concise and efficient firewall policies, using techniques like address/port combination and performance tuning based on traffic analysis [31,22,11]. All this research is orthogonal to our work, and can be applied to improve the quality of firewall policies before they are deployed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This work has formalized types of conflicts in firewall policies and provided a variety of fast and efficient algorithms to detect them. Going one step further, researchers have proposed optimization algorithms to generate more concise and efficient firewall policies, using techniques like address/port combination and performance tuning based on traffic analysis [31,22,11]. All this research is orthogonal to our work, and can be applied to improve the quality of firewall policies before they are deployed.…”
Section: Related Workmentioning
confidence: 99%
“…To address the policy specification problem, policy provisioning and management have received a great deal of attention [16,26,21], as have conflict detection [13,20,15,14,38] and optimization [31,22,11]. In parallel with this academic research, firewall management tools such as Cisco Security Manager [4], Juniper Networks' Netscreen-Security Manager [8], and Check Point SmartCenter [1] have gained popularity with network administrators.…”
Section: Introductionmentioning
confidence: 99%
“…For this proposal instantiation, the following features will be considered in the assessment of a candidate solution CM i : (i) type 1]). Each one of these aspects has an associated weight w ∈ [0, 1] in the general candidate fitness Eq.…”
Section: Fitness Functionmentioning
confidence: 99%
“…We define the measured risk level value as RL(A i , T j ) ∈ [1,10], where 1 is the lowest risk value and 10 the highest risk value that can be measured.…”
Section: Risk Analysis Modulementioning
confidence: 99%
“…At a first glance, this problem is related to access control, one of the common techniques is to make use of an Access Control List (ACL) (Barkley 1997, Li et al 2002, Qian 2001, Stiegler 1979) which states clearly which user is allowed to access which resources (documents) together with the allowable operations (e.g. read, write, delete) in the form of a data structure (e.g.…”
Section: Introductionmentioning
confidence: 99%