2017
DOI: 10.1145/3130876
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Literature Review on Usability of Firewall Configuration

Abstract: Firewalls are network security components that handle incoming and outgoing network traffic based on a set of rules. The process of correctly configuring a firewall is complicated and prone to error, and it worsens as the network complexity grows. A poorly configured firewall may result in major security threats; in the case of a network firewall, an organization’s security could be endangered, and in the case of a personal firewall, an individual computer’s security is threatened. A major reason for poorly co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 49 publications
0
12
0
2
Order By: Relevance
“…The techniques presented in this paper are fully automatic and do not require any interaction with the network administrator. However, as a future work, we propose to explore the potential of putting the network administrator in the loop and providing visualization tools 32 to assist the administrator in managing the order of the rules of the firewall to increase its performance.…”
Section: Resultsmentioning
confidence: 99%
“…The techniques presented in this paper are fully automatic and do not require any interaction with the network administrator. However, as a future work, we propose to explore the potential of putting the network administrator in the loop and providing visualization tools 32 to assist the administrator in managing the order of the rules of the firewall to increase its performance.…”
Section: Resultsmentioning
confidence: 99%
“…It is worth noting that rule conflict problem can occur; however, this problem is well investigated in the literature. Methods such as the one in [186] can be used to detect potential rule conflict before committing a new rule. A smart home scenario will be used in this chapter as a typical smart space to present the framework and its components.…”
Section: Introductionmentioning
confidence: 99%
“…Although most of them are purely theoretical, they stress the relevance of the problem of quantifying the usability of rule sets. The literature review on the usability of firewall configuration by Voronkov et al [8] investigates solutions to help professional and non-professional users in creating and managing firewall configuration files, and analyzes such solutions in respect to usability. The authors observe that there is a general lack of usability evaluation or user studies for validating the claims in the 14 articles included in the systematic literature review.…”
Section: Introductionmentioning
confidence: 99%