2021
DOI: 10.3390/fi13110283
|View full text |Cite
|
Sign up to set email alerts
|

Misconfiguration in Firewalls and Network Access Controls: Literature Review

Abstract: Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 36 publications
0
1
0
Order By: Relevance
“…A scenario where it is assumed that the intruder bypassed the firewall defensive mechanism and gained access to the network by utilizing multiple methods could be because: Misconfigurations found in the firewall protocols create loopholes that grant the intruder access inside the network via overly permissive rules or incorrect settings, which are exploited by the attacker [ 65 ]. Vulnerabilities in firewall rules are exploited by employing sophisticated attacks that target the applications or services via zero-day [ 66 ] attacks, as the firewall is not regularly maintained and updated and is incapable of blocking unknown threats and vulnerabilities.…”
Section: Ids Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…A scenario where it is assumed that the intruder bypassed the firewall defensive mechanism and gained access to the network by utilizing multiple methods could be because: Misconfigurations found in the firewall protocols create loopholes that grant the intruder access inside the network via overly permissive rules or incorrect settings, which are exploited by the attacker [ 65 ]. Vulnerabilities in firewall rules are exploited by employing sophisticated attacks that target the applications or services via zero-day [ 66 ] attacks, as the firewall is not regularly maintained and updated and is incapable of blocking unknown threats and vulnerabilities.…”
Section: Ids Architecturementioning
confidence: 99%
“…Misconfigurations found in the firewall protocols create loopholes that grant the intruder access inside the network via overly permissive rules or incorrect settings, which are exploited by the attacker [ 65 ].…”
Section: Ids Architecturementioning
confidence: 99%