2015 IEEE 14th International Symposium on Network Computing and Applications 2015
DOI: 10.1109/nca.2015.31
|View full text |Cite
|
Sign up to set email alerts
|

Automated and Optimized FDD-Based Method to Fix Firewall Misconfigurations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Given f i representing the domain of positive integers is a finite range, denoted D(f i ). For example, the domain of the source (D(f 1 )) and destination address (D(f 3 )) in IP v4 packet is [0, 2 32 -1], source (D(f 2 )) and destination port (D(f 4 )) is [0, 2 16 -1] and protocol (D(f 5 )) is [0, 2 8 -1]. C i defines a set of packet fields over the fields f 1 through f d specified as…”
Section: Rule Definition and Anomaliesmentioning
confidence: 99%
See 1 more Smart Citation
“…Given f i representing the domain of positive integers is a finite range, denoted D(f i ). For example, the domain of the source (D(f 1 )) and destination address (D(f 3 )) in IP v4 packet is [0, 2 32 -1], source (D(f 2 )) and destination port (D(f 4 )) is [0, 2 16 -1] and protocol (D(f 5 )) is [0, 2 8 -1]. C i defines a set of packet fields over the fields f 1 through f d specified as…”
Section: Rule Definition and Anomaliesmentioning
confidence: 99%
“…The rules are corrected by deletion if they are detected as a redundant anomaly, but ruleswapping is applied when a shadowing or correlation anomaly is detected. Additionally, some algorithms [15], [16] can detect and diagnose firewall abnormalities, but these methods are not based on actual evidence. In most of the methods mentioned above, no method perfectly corrects for anomalies in the firewall rules.…”
Section: Introductionmentioning
confidence: 99%
“…Concerning cloud firewalls, the fact that WAF acts directly to the web application and the application layer does not imply serious security constraint, therefore, WAF provides a certain degree of flexibility and attracts decision-makers to opt for this solution. Furthermore, WAF is particularly effective against several vulnerabilities at the data validation level, but they can also interact and collaborate with the source code level, and then switch very quickly from denying rules to a recommended set of policy applicable in the next maintenance windows [59,60]. Some automatic rules (for example against data leakages) are configurable in last WAF application manager interfaces, such as the filtering of comments, which may involve sensitive area (i.e., passwords or other private content), and some parameters are automatically checked by the WAF, with regular ACLs update.…”
Section: Firewall Placement In Smart Healthcare Environmentmentioning
confidence: 99%
“…Given representing the domain of positive integers is a finite range, denoted ( ) . For example, the domain of the source and destination address in an IP packet is [0, 2 32 -1] ( ( 1 ) and ( 2 )), source and destination port is [0, 2 16 -1] ( ( 3 ) and ( 4 )) and protocol is [0, 2 8 -1] ( ( 5 )). defines a set of packet fields over the fields 1 through specified as 1 ∈ 1 ∧ 2 ∈ 2 ∧ … ∧ ∈ where is a subset of ( ).…”
Section: = →mentioning
confidence: 99%
“…It uses an automatic rule removal in the case of redundancy and contradiction anomaly, and uses an automatic rule permutation against shadowing and correlation. Besides, some techniques allow the firewall to automatically detect and analyze conflict rules such as [15] and [16], but they are not based on real tangible evidence. By most methods, the burden of resolving rule conflicts is often given to the administrator's discretion instead.…”
Section: Introductionmentioning
confidence: 99%