2021
DOI: 10.1109/access.2021.3100141
|View full text |Cite
|
Sign up to set email alerts
|

F/Wvis: Hierarchical Visual Approach for Effective Optimization of Firewall Policy

Abstract: As an essential system for protecting internal networks and valuable information, the firewall monitors and controls network traffic in terms of access control, authentication, logging, and auditing. In particular, it carries out both allowing and blocking communications between internal and external networks based on proper Access Control List (ACL). However, a complex ACL along with huge network environments lead to exposing vulnerabilities and communication problems, because of anomalies among policies. Eve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…The visualization offers 360-degree rotation, zoom in/out, rule selection, and 3D representation. TAEYONG KIM et al [12] proposed a 3D-based hierarchical visualization tool named F/Wvis. Notably, F/Wvis offers a drill-down user interface through a hierarchical visualization approach, supporting ACL management for large-scale networks and detailed anomaly analysis of policies.…”
Section: ) Abuse Policy Resolution and Visualizationmentioning
confidence: 99%
“…The visualization offers 360-degree rotation, zoom in/out, rule selection, and 3D representation. TAEYONG KIM et al [12] proposed a 3D-based hierarchical visualization tool named F/Wvis. Notably, F/Wvis offers a drill-down user interface through a hierarchical visualization approach, supporting ACL management for large-scale networks and detailed anomaly analysis of policies.…”
Section: ) Abuse Policy Resolution and Visualizationmentioning
confidence: 99%
“…Local contrast enhancement methods need to be used to enhance the contrast of highfrequency areas in laser imaging images. Select 3 * 3 pixels from the original laser X-ray imaging image to enhance local contrast [6]. The method used in this process is local statistical method, and the expression is shown in equation ( 1):…”
Section: Enhance Local Contrast Of Imagesmentioning
confidence: 99%
“…Another relevant classes of related work about the topic of firewall anomaly analysis is composed of studies ( [27], [28], [29], [30], [31], [32], [33], [34]) that propose platforms based on Graphic User Interfaces (GUIs), which provide functionalities such as zooming and manual adjustment of the firewall filtering effect areas to help human administrators to identify firewall policy anomalies. Specifically, Tran et al [27] propose PolicyVis, a 2D graphic interface that allows a thorough visualization of all possible firewall behaviors by considering all rules fields, actions and orders.…”
Section: A Firewall Policy Anomaly Analysismentioning
confidence: 99%
“…Among them, the most useful ones are the hierarchy view, which visualizes firewall policy ranges based on destination IP octets at the user's choice, and the anomaly and distributed views, which represent the policy in parallel coordinate charts, easing anomaly detection. Kim et al [34] introduces a system, named F/Wvis, that allows to visualizes both firewall policies and anomalies on the layout of an user interface with a 3D representation. From that, the user can almost immediately identify how many rules composed the firewall policy and which rule has anomalies with other rules from the same policy.…”
Section: A Firewall Policy Anomaly Analysismentioning
confidence: 99%