Efficiently Managing Firewall Conflicting Policies
|
|
|
- Cory Anderson
- 9 years ago
- Views:
Transcription
1 Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering and Technology, Eluru,W.G Dist,A.P 12. Abstract: Firewalls are a widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the firewall. However, designing and managing firewall policies are often error-prone due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools. This paper represents an innovative anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions. PolicyVis presented in this paper provides visual views on firewall policies and rules which gives users a powerful means for inspecting firewall policies Keywords: Firewall, Policy Anomaly Management, Visualization Tool I. Introduction Firewall A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. Firewalls usually function as routers which connect different network segments together. It is simply a perimeter defense device splitting network environment into internal (trusted) and external (distrusted) network for controlling and filtering incoming and outgoing network traffic. Its packet filtering decision depends on a set of policy rules (also named policy rule table) describing the security policy and posture the corporation takes, and thus to effectively avoid suspicious intruder executing illegal actions and damaging internal network. Figure 1: Firewall in Networks Firewall Policy A firewall is a network element that controls the traversal of packets across the boundaries of a secured network based on a specific security policy. A firewall security policy is a list of ordered filtering rules that define the actions performed on matching packets. Filtering actions are either to accept, which passes the packet into or from the secure network, or to deny, which causes the packet to be discarded. To implement a security policy in a firewall, system administrators define a set of filtering rules that are derived from the organizational network security requirements. Firewall policy management is a challenging task due to the complexity and interdependency of policy rules. This is further exacerbated by the 131 IJDCST
2 continuous evolution of network environments. Therefore, effective mechanisms and tools for policy management are crucial to the success of firewalls. The complex nature of policy anomalies, system administrators are often faced with a more challenging problem in resolving anomalies, in particular, resolving policy conflicts. An intuitive means for a system administrator to resolve policy conflicts is to remove all conflicts by modifying the conflicting rules. However, changing the conflicting rules is significantly difficult, even impossible, in practice from many aspects. First, the number of conflicts in a firewall is potentially large, since a firewall policy may consist of thousands of rules, which are often logically entangled with each other. Second, policy conflicts are often very complicated. One rule may conflict with multiple other rules, and one conflict may be associated with several rules. Besides, firewall policies deployed on a network are often maintained by more than one administrator, and an enterprise firewall may contain legacy rules that are designed by different administrators. II. System Architecture Firewall system needs a series of procedures, including log analysis, rule update, and configuration, to continuously maintain inner policy table for facilitating its security efficiency, hence, it is definitely a costly and error prone job for large networked organization. Figure 2: Firewall Policy Architecture In Rule Analysis procedure, the process consists of following three modules: log preprocess, log analysis, and rule generalization. Firewall log data would be firstly parsed into log preprocess module to extract primary attributes of log data: [Date], [Time], [Protocol], [Source IP] (Src_IP), [Source Port] (Src_Port), [Destination IP] (Dst_IP), [Destination Port] (Dst_Port), and [Action], simplifying raw firewall log data for facilitating the processing efficiency. Then, system will utilize our proposed log analysis methods to derive valuable traffic rules from preprocessing log data. After log analysis step, a collection of traffic rules would be generated, and then system would perform rule generalization to generalize a set of novel rules reflecting current environment from previous results. Anomalies in Firewall Policies Table 1: Firewall Policy Example Shadowing: A rule can be shadowed by one or a set of preceding rules that match all the packets which also match the shadowed rule, while they perform a different action. In this case, all the packets that one rule intends to deny (accept) can be accepted (denied) by previous rule(s), thus the shadowed rule will never be taken effect. In Table 1, r4 is shadowed by r3 because r3 allows every TCP packet coming from any port of * to the port 25 of *, which is supposed to be denied by r4. Generalization: A rule is a generalization of one or a set of previous rules if a subset of the packets matched by this rule is also matched by the preceding rule(s) but taking a different action. For example, r5 is a generalization of r4 in Table 1. These two rules indicate that all the packets from * are allowed, except TCP packets from * to the port 25 of *. Note that, as we discussed earlier, generalization might not be an error. Correlation: One rule is correlated with other rules, if a rule intersects with others but defines a different action. In this case, the packets matched by the intersection of those rules may be permitted 132 IJDCST
3 by one rule, but denied by others. In Table 1, r2 correlates with r5, and all UDP packets coming from any port of * to the port 53 of * match the intersection of these rules. Since r2 is a preceding rule of r5, every packet within the intersection of these rules is denied by r2. However, if their positions are swapped, the same packets will be allowed. Redundancy: A rule is redundant if there is another same or more general rule available that has the same effect. For example, r1 is redundant with respect to r2 in Table 1, since all UDP packets coming from any port of * to the port 53 of * matched with r1 can match r2 as well with the same action. Policy Conflicts A policy conflict pc in a firewall F is associated with a unique set of conflicting firewall rules cr={r1,, rk}, which can derive a common network packet space. All packets within this space can match exactly the same set of firewall rules, where at least two rules have different actions: Allow and Deny. Rule Redundancy A rule r in a firewall F is redundant if removing r from F fulfills that the network packet space derived from the new firewall F0 is equal to the network packet space defined by F. That is, F and F0 satisfy following equations: SA F = SA F0 and SD F = SD F0, where SA and SD denote allowed and denied network packet spaces, respectively. Packet Space Segmentation A more effective anomaly resolution, we adopt a rule-based segmentation technique, which can convert a list of rules into a set of disjoint network packet spaces. Figure 2(a) gives the two dimensional geometric representation of packet spaces derived from the example policy shown in Table 1. We utilize colored rectangles to denote two kinds of packet spaces: allowed space (white color) and denied space (grey color), respectively. In this example, there are two allowed spaces representing rules r3 and r5, and three denied spaces depicting rules r1, r2 and r4. Two spaces overlap when the packets matching two corresponding rules intersect. For example, r5 overlaps with r2, r3 and r4, respectively. An overlapping relation may involve multiple rules. In order to clearly represent all identical packet spaces derived from a set of overlapping rules, we adopt the rule-based segmentation technique to divide an entire packet space into a set of pairwise disjoint segments. We classify the policy segments as follows: nonoverlapping segment and overlapping segment, which is further divided into conflicting overlapping segment and non-conflicting overlapping segment. Figure 4: Packet Space Segmentation Figure 5: uniform representation Three policy segments s2, s4 and s7 are nonoverlapping segments. Other policy segments are overlapping segments, including two conflicting overlapping segments s3 and s5, and two nonconflicting overlapping segments s1 and s6. Figure 3: Two dimensional geometric representation of overlapping rules 133 IJDCST
4 reordering associated conflicting rules, r2 and r5. The position change of r2 and r5 would also affect other segments, s1, s2, s4, s5 and s6. Thus, a dependency relationship among those segments can be derived. We cluster such segments with a dependency relationship as a group called correlation group. Action Constraint An action constraint ac for a conflicting segment cs defines a desired action (either Allow or Deny) that the firewall policy should take when any packet in the conflicting segment comes to the firewall. Figure 6: Grid Representation of policy Anomaly Grid Representation of Policy Anomaly In the above diagram, the administrator difficult to identify the one rule participates in different segments. We additionally introduce a grid representation that is a matrix-based visualization of policy anomalies, in which space segments are displayed along the horizontal axis of the matrix, rules are shown along the vertical axis, and the intersection of a segment and a rule is a grid that displays a rule s subspace covered by the segment. We can easily determine which rules are covered by a segment, and which segments are associated with a rule. Anomaly Management Framework Our anomaly management framework is composed of two main functionalities: conflict detection and resolution, and redundancy discovery and removal, Correlation of Packet Space Segment Figure 8: Firewall Policy Management Framework Figure 7: Segment Correlation Example Actually, Several rules in this firewall policy are involved in multiple anomalies. For example, r2 is associated with three segments s1, s2 and s3. Also, we can identify r3, r5, r6 and r7 are also associated with multiple segments. Assume we need to resolve the conflict related to a conflicting segment s3 by Conflict Detection & Resolution First it identifies conflicting segments. The second step generates action constraints for each conflicting segment by examining the characteristics of each conflicting segment. The third step utilizes a reordering algorithm, which is a combination of a permutation algorithm and a greedy algorithm, to discover a near-optimal conflict resolution solution for policy conflicts. Redundancy discovery and removal First it identifies segment correlation groups 134 IJDCST
5 Second the process of property assignment is performed to each rule s subspaces. Consequently, redundant rules are identified and eliminated. System Architecture of FAME It consists of six components: segmentation module, correlation module, risk assessment module, action constraint generation module, rule reordering module, and property assignment module. The segmentation module takes firewall policies as an input and identifies the packet space segments by partitioning the packet space into disjoint subspaces. Once the segmentation of packet space is identified, FAME further identifies different kinds of segments and corresponding correlation groups The rule reordering module takes conflict correlation groups and action constraints of conflicting segments as inputs and generates optimal or nearoptimal conflict resolution for policy conflicts using a combined reordering algorithm in our framework. The property assignment module takes segment correlation groups as inputs and automatically assigns corresponding properties to each rule subspace covered by policy segments. The assigned properties are in turn utilized to identify redundant rules. Firewall Policy Visualization Tool A tool called Policy Visualization which visualizes firewall rules and policies in such a way that efficiently enhances the understanding and inspecting firewall policies. Conclusion In this paper, we have proposed a anomaly management framework that facilitates efficient detection and resolution of firewall policy anomalies. A rule-based segmentation technique was introduced to achieve the goal of effective and efficient anomaly analysis. In addition, we have described an implementation of our anomaly management environment called FAME, clearly demonstrating that our proposed anomaly analysis methodology is practical and useful for system administrators to enable an assurable network management. Figure 9 :Architecture of FAME In risk assessment module, Nessus [3] is utilized as a vulnerability scanner to identify the vulnerabilities within a conflicting segment. Firewalls provide proper security services if they are correctly configured and efficiently managed. Firewall policies used in enterprise networks are getting more complex as the number of firewall rules and devices becomes larger. As a result, there is a high demand for an effective policy management tool which significantly helps user in discovering firewall policy's properties and finding rule anomalies in both single and distributed firewalls. PolicyVis presented in this paper provides visual views on firewall policies and rules which gives users a powerful means for inspecting firewall policies. The action constraint generation module takes conflicting segments as an input and generates action constraints for each conflicting segment. Action constraints are generated based on strategies assigned to each conflicting segment. 135 IJDCST
6 References [1] E. Al-Shaer and H. Hamed. Firewall Policy Advisor for anomaly discovery and rule editing. In Integrated Network Management, IFIP/IEEE Eighth International Symposium on, pages 17 30, [2] E. Al-Shaer and H. Hamed. Discovery of policy anomalies in distributed firewalls. In IEEE INFOCOM, volume 4, pages , [3] E. Al-Shaer, W. Marrero, A. El-Atawy, and K. ElBadawi. Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. In Proceedings of the 17th IEEE International Conference on Network Protocols (ICNP), pages , [4] J. Alfaro, N. Boulahia-Cuppens, and F. Cuppens. Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 7(2): , [5] F. Baboescu and G. Varghese. Fast and scalable conflict detection for packet classifiers. Computer Networks, 42(6): , [6] Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit. ACM Transactions on Computer Systems (TOCS), 22(4): , [7] S. Bellovin. Distributed firewalls. Journal of Login, 24(5):37 39, [8] C. Brodie, C. Karat, and J. Karat. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. In Proceedings of the second symposium on Usable privacy and security, page 19. ACM, [9] E. Chew, M. Swanson, K. Stine, N. Bartol, A. Brown, and W. Robinson. Performance measurement guide for information security. NIST Special Publication, pages , [10] A. El-Atawy, K. Ibrahim, H. Hamed, and E. Al-Shaer. Policy segmentation for intelligent firewall testing. In 1st Workshop on Secure Network Protocols (NPSec 2005), Raghvendra Swamy.K received his Mastres Degree in computer Science From Sri Y.N College, Narsapur,, in 2003, the M.TECH. degree in CSE from Eluru College of Engineering and Technology,Eluru in At present, He is engaged in Efficiently Managing Firewall conflicting policies. B.Prashant Received His B.Tech Degree In EEE From Bapatla Engineering College, Bapatla, Guntur(Dt), in 2002, M.Tech. Degree in CSE from Nova College Of Engineering And Technology,Jangareddygudem in He has 8 years of experience in teaching. Currently he is working as Associate Professor in Eluru College of Engineering and Technology, Eluru. Area Of Interests Artificial Intelligence And Neural Networks, Memory Management, Data Mining. 136 IJDCST
Methods for Firewall Policy Detection and Prevention
Methods for Firewall Policy Detection and Prevention Hemkumar D Asst Professor Dept. of Computer science and Engineering Sharda University, Greater Noida NCR Mohit Chugh B.tech (Information Technology)
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
Firewall Policy Anomaly Management with Optimizing Rule Order
Firewall Policy Anomaly Management with Optimizing Rule Order 1.Ms. Swati S. Kachare, 2 Dr. P.K. Deshmukh 1,Computer Department - Rajarshi Shahu College of Engg. Pune 2.Computer Department - Rajarshi Shahu
Optimization of Firewall Filtering Rules by a Thorough Rewriting
LANOMS 2005-4th Latin American Network Operations and Management Symposium 77 Optimization of Firewall Filtering Rules by a Thorough Rewriting Yi Zhang 1 Yong Zhang 2 and Weinong Wang 3 1, 2, 3 Department
ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280. www.semargroup.org
ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280 www.semargroup.org Firewall Policy Anomaly Detection and Resolution R.V.DARADE 1, PROF.P.B.KUMBHARKAR 2 1 Dept of Computer Engineering, SCOE, Sudumbare,
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain
Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain Kamarasa V D S Santhosh M.Tech Student, Department of ComputerScience & Engineering, School of Technology, Gitam University,
Comparing and debugging firewall rule tables
Comparing and debugging firewall rule tables L. Lu, R. Safavi-Naini, J. Horton and W. Susilo Abstract: Firewalls are one of the essential components of secure networks. However, configuring firewall rule
Management of Exceptions on Access Control Policies
Management of Exceptions on Access Control Policies J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France, {frederic.cuppens,nora.cuppens}@enst-bretagne.fr
An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization
An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization Yogita Nikhare 1 andprof. Anil Bende 2 1 M.TechScholar, Department of Computer Science
Design and Implementation of Firewall Policy Advisor Tools
Design and Implementation of Firewall Policy Advisor Tools Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems
Complete Redundancy Detection in Firewalls
Complete Redundancy Detection in Firewalls Alex X. Liu and Mohamed G. Gouda Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, USA {alex, gouda}@cs.utexas.edu
How To Write A Privacy Preserving Firewall Optimization Protocol
Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.1, No.2 (2011), pp. 93-100 http://dx.doi.org/10.14257/ajmscahs.2011.12.06 Secure Multi-Party Computation in
Packet Filtering Rule List Analysis
Filtering List Analysis Chotipat Pornavalai and Thawatchai Chomsiri Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang Ladkrabang, Bangkok 10520, Thailand. Abstract: Firewalls
Conflict Classification and Analysis of Distributed Firewall Policies
Conflict Classification and Analysis of Distributed Firewall Policies 1 Ehab Al-Shaer and Hazem Hamed School of Computer Science DePaul University, Chicago, USA Email: {ehab, hhamed}@cs.depaul.edu Raouf
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Firewall Configuration based on Specifications of Access Policy and Network Environment
Firewall Configuration based on Specifications of Access Policy and Network Environment A. Titov, V. Zaborovsky Saint-Petersburg State Polytechnical University, Russia [email protected], [email protected] Abstract
Firewall Queries. Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu 2 Department of Computer Science, Texas State University,
Firewall Queries Alex X. Liu 1, Mohamed G. Gouda 1, Huibo H. Ma 2, Anne HH. Ngu 2 1 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu
Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model
94 IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model Naveen Mukkapati,
Firewall and Its Policies Management
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Policy Distribution Methods for Function Parallel Firewalls
Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
PolicyVis: Firewall Security Policy Visualization and Inspection
PolicyVis: Firewall Security Policy Visualization and Inspection Tung Tran, Ehab Al-Shaer, and Raouf Boutaba University of Waterloo, Canada ABSTRACT Firewalls have an important role in network security.
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Reducing the Size of Rule Set in a Firewall
Reducing the Size of Rule Set in a Firewall MyungKeun Yoon Shigang Chen Zhan Zhang Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA 352 392 2713
FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.279
SPML: A Visual Approach for Modeling Firewall Configurations
SPML: A Visual Approach for Modeling Configurations Kleber Manrique Trevisani and 2 Rogério Eduardo Garcia Universidade do Oeste Paulista Faculdade de Informática de Presidente Prudente, Rua José Bongiovani,
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Consistency verification of stateful firewalls is not harder than the stateless case
RESEARCH Consistency verification of stateful firewalls is not harder than the stateless case LEVENTE BUTTYÁN, GÁBOR PÉK, TA VINH THONG Laboratory of Cryptography and Systems Security Budapest University
How to Painlessly Audit Your Firewalls
W h i t e P a p e r How to Painlessly Audit Your Firewalls An introduction to automated firewall compliance audits, change assurance and ruleset optimization May 2010 Executive Summary Firewalls have become
PolicyVis: Firewall Security Policy Visualization and Inspection
PolicyVis: Firewall Security Policy Visualization and Inspection Tung Tran, Ehab Al-Shaer, and Raouf Boutaba University of Waterloo, Canada ABSTRACT Firewalls have an important role in network security.
12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
Firewall Policy Change-Impact Analysis
15 Firewall Policy Change-Impact Analysis ALEX X LIU, Michigan State University Firewalls are the cornerstones of the security infrastructure for most enterprises They have been widely deployed for protecting
II. BASICS OF PACKET FILTERING
Use of Formal models for the Firewall Policy Optimization ShatanandPatil* and B. B. Meshram** *(Department of Computer Technology, Veermata Jijabai Technical Institute, Mumbai 19) *(Department of Computer
Firewall Design Principles
Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs Ashish Tapdiya and Errin W. Fulp Department of Computer Science Wake Forest University Winston Salem, NC, USA nsg.cs.wfu.edu Email:
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center Creating valuable information from millions of system events can be an extremely difficult and time consuming task. Particularly
Firewalls & Intrusion Detection
Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis Lihua Yuan [email protected] Hao Chen [email protected] Jianning Mai [email protected] Chen-Nee Chuah [email protected] Zhendong Su
A Pattern Language for Firewalls
A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Larrondo-Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton,
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Lecture 23: Firewalls
Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital
A Matrix Model for Designing and Implementing Multi-firewall Environments
A Matrix Model for Designing and Implementing Multi-firewall Environments Loye L. Ray Department of Cyber Security and Information Assurance, University of Maryland University College, 3501 University
Trie-Based Policy Representations for Network Firewalls
Proceedings of the IEEE International Symposium on Computer Communications, 2005 Trie-Based Policy Representations for Network Firewalls Errin W. Fulp and Stephen J. Tarsa Wake Forest University Department
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM IRANDOC CASE STUDY Ammar Jalalimanesh a,*, Elaheh Homayounvala a a Information engineering department, Iranian Research Institute for
Survey on Geometric Efficient Matching Algorithm for Firewall
Survey on Geometric Efficient Matching Algorithm for Firewall Sapana Borole & P.K. Deshmukh Department of Computer Engineering JSPM s Rajarshi Shahu College of Engineering Tathawade, Pune E-mail : [email protected]
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Data Mining. 1 Introduction 2 Data Mining methods. Alfred Holl Data Mining 1
Data Mining 1 Introduction 2 Data Mining methods Alfred Holl Data Mining 1 1 Introduction 1.1 Motivation 1.2 Goals and problems 1.3 Definitions 1.4 Roots 1.5 Data Mining process 1.6 Epistemological constraints
Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012 107 Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study Mehdi Jahanirad,
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
Analysis of Firewall Policy Rules Using Data Mining Techniques
Analysis of Firewall Policy Rules Using Data Mining Techniques Korosh Golnabi, Richard K. Min, Latifur Khan Department of Computer Science The University of Texas at Dallas Richardson, USA (koroshg, rkm010300,
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Application Note. Stateful Firewall, IPS or IDS Load- Balancing
Application Note Stateful Firewall, IPS or IDS Load- Balancing Document version: v1.0 Last update: 8th November 2013 Purpose Improve scallability of the security layer Limitations when Load-Balancing firewalls
AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
A semantic based tool for firewall configuration
A semantic based tool for firewall configuration (Extended abstract) P. Adão SQIG IT, Instituto de Telecomunicações and Instituto Superior Técnico, Universidade de Lisboa, Portugal Email: [email protected]
Deploying ACLs to Manage Network Security
PowerConnect Application Note #3 November 2003 Deploying ACLs to Manage Network Security This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx Abstract With new system
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
- Introduction to Firewalls -
1 Firewall Basics - Introduction to Firewalls - Traditionally, a firewall is defined as any device (or software) used to filter or control the flow of traffic. Firewalls are typically implemented on the
