Conflict classification and analysis of distributed firewall policies
E Al-Shaer, H Hamed, R Boutaba… - IEEE journal on …, 2005 - ieeexplore.ieee.org
E Al-Shaer, H Hamed, R Boutaba, M Hasan
IEEE journal on selected areas in communications, 2005•ieeexplore.ieee.orgFirewalls are core elements in network security. However, managing firewall rules,
particularly, in multifirewall enterprise networks, has become a complex and error-prone
task. Firewall filtering rules have to be written, ordered, and distributed carefully in order to
avoid firewall policy anomalies that might cause network vulnerability. Therefore, inserting or
modifying filtering rules in any firewall requires thorough intrafirewall and interfirewall
analysis to determine the proper rule placement and ordering in the firewalls. In this paper …
particularly, in multifirewall enterprise networks, has become a complex and error-prone
task. Firewall filtering rules have to be written, ordered, and distributed carefully in order to
avoid firewall policy anomalies that might cause network vulnerability. Therefore, inserting or
modifying filtering rules in any firewall requires thorough intrafirewall and interfirewall
analysis to determine the proper rule placement and ordering in the firewalls. In this paper …
Firewalls are core elements in network security. However, managing firewall rules, particularly, in multifirewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered, and distributed carefully in order to avoid firewall policy anomalies that might cause network vulnerability. Therefore, inserting or modifying filtering rules in any firewall requires thorough intrafirewall and interfirewall analysis to determine the proper rule placement and ordering in the firewalls. In this paper, we identify all anomalies that could exist in a single- or multifirewall environment. We also present a set of techniques and algorithms to automatically discover policy anomalies in centralized and distributed firewalls. These techniques are implemented in a software tool called the "Firewall Policy Advisor" that simplifies the management of filtering rules and maintains the security of next-generation firewalls.
ieeexplore.ieee.org