Confident Firewall Policy Configuration Management using Description Logic
|
|
|
- Myra Riley
- 10 years ago
- Views:
Transcription
1 Confident Firewall Policy Configuration Management using Description Logic William M. Fitzgerald 1,2 Simon N. Foley 2 Mícheál Ó Foghlú1 1 Telecommunications Software & Systems Group Waterford Institute of Technology, Ireland (wfitzgerald,mofoghlu)@tssg.org 2 Department of Computer Science, University College Cork, Ireland. [email protected] Abstract. The provisioning of a firewall is one of the first important steps toward securing access control to a network. However, the effectiveness of a firewall s access control may be limited or compromised by poor configuration and management of firewall policy decisions. Firewall configuration management involves, either the use of a command-line interface with a deep knowledge requirement of the firewall s complex low-level command syntax, or to a limited extent, the use of a graphical management console. Confidence in a firewall configuration is hampered by the complexity of properly comprehending a configuration that achieves the desired business-level security requirements. We outline an approach that enables network administrators to provision firewall configuration policies in a reliable, convenient, conflict-free and automated way. The approach uses Description Logic and the Semantic Web Rule Language to model and infer reliable firewall configuration policies for Linux Netfilter. 1 Introduction Management of firewall policy configurations can be complex, error-prone, costly and inefficient for many large networked organizations [1]. Implementing a firewall configuration policy either involves writing low-level command syntax via a Command Line Interface (CLI) or the use of a graphical management console. Typical errors in a firewall configuration policy range from invalid syntax and inappropriate rule ordering, to errors in properly comprehending the configuration, given its scale and complexity [2]. The Graphical User Interface, (GUI), is the most commonly used method to configure a firewall in a timely manner, especially amongst inexperienced administrators. One of the major disadvantages of using this method is configuration granularity: as with most modern firewalls there are options that cannot be configured using a graphical interface [2, 1]. Manually managing firewall policy configurations becomes impractical and time consuming as the number of firewall decisions increases beyond the reasonable scope and scale of a human oriented management system [3]. We propose the use of Description Logic to define firewall configuration policies. Description Logic (DL) is a knowledge representation language that can be used to express terminological knowledge of an application domain in a structured and formally unambiguous manner [4]. In using DL, we capture the firewall knowledge domain and provide a general vocabulary for firewall configuration. Reasoning plays a vital role in ensuring the quality of a firewall configuration and the Semantic Web Rule Language, SWRL [5], provides an ability to validate abstract firewall requirements. Description Logics are a decidable subset of first order logic which facilitates automated inference of implied information from a firewall configuration and the detection of inconsistencies. 2 Firewall Conflicts Table 1 provides a fragment of a Linux Netfilter firewall access control configuration. In general, firewall decisions are activated in sequence starting at Decision 1. A shadowed [6] decision is one that is never activated due to previous decisions filtering the same kinds of packets but those decisions
2 Decision Chain Src IP Src Port Dst IP Dst Port State Action Conflict 1 Forward *.*.*.* any Drop 2 Forward any Accept Shadowed by (1) 3 Output any * 21 Rel Drop 4 Output any * 22 Est Drop 5 Output any ,22 Est,Rel Accept Shadowed by (3,4) Table 1. Firewall Decision Policy Example Extract having different target actions. In Table 1, Decision 2 is shadowed by Decision 1, with the result that http traffic from host which is intended to be acceptable, is not permitted. In [6] a number of classes of firewall conflicts are considered, including redundancy, correlation and generalization. For reasons of space we do not consider them in this paper. 3 Description Logic and Ontologies An ontology is an explicit specification of a conceptualisation using an agreed vocabulary and provides a rich set of constructs to build a more meaningful level of knowledge. An important characteristic of the Semantic Web (as constrained by DL) is that the information contained in it is specified using a formal language in order to enable automated reasoning and the derivation of new knowledge from existing knowledge. Description Logic (DL) is a family of logic-based formalisms that forms part of the W3C recommendation for the Semantic Web. DL uses classes (concepts) to represent sets of individuals (instances) and properties (roles) to represent binary relations applied to individuals. For example, the DL assertion ServerN ode N ode hast rustservice.service hasf irewall.f irewall specifies that a server node (class) hosts trusted services (class) and has (property) a firewall (class) protecting them. The Semantic Web Rule Language SWRL complements DL providing the ability to infer additional information in DL ontologies, but at the expense of decidability. SWRL rules are Horn-clause like rules written in terms of DL concepts, properties and individuals. A SWRL rule is composed of an antecedent part and a consequent part, both of which consist of positive conjunctions of atoms. For example, the requirement servers hosting ssh based services protected by a firewall require that firewall to open port 22 is expressed in SWRL as: ServerN ode(?n) hast rustservice(?n, s) hasp ort(?s, ssh) hasf irewall(?n,?f) hasp ortopen(?f, ssh) 4 Netfilter Configuration Ontology We have developed a DL-based ontology for Netfilter. Figure 1 depicts a fragment of the class taxonomy for this model. The taxonomy provides the classes, subclasses and individuals that are inferred from the DL specification of the ontology. For example, firewall decision classes are defined as subclasses of the class N amedf irewalldecision which defines the necessary & sufficient conditions for the composition of a firewall decision. A Netfilter firewall decision is composed of exactly one chain, one or more condition filters and a single permission target. This is expressed as the DL assertion: NamedF irewalldecision NetfilterF irewall =1 haschain.chain 1 hasconditionmatch.conditionf ilter =1 hast arget.t arget
3 Fig. 1. DL Class Taxonomy Fragment Netfilter s global firewall configuration policy is composed of a number of sub-governing local policies controlled by each of its in-built chains (Chain class) to which various protective packet condition filters (ConditionF ilter class) and their respective verdict permissions (T arget class) are applied. The following Netfilter CLI syntax represents a decision to accept inbound packets that are part of previously permitted sessions based on stateful filtering: iptables -A INPUT -m state - -state RELATED,ESTABLISHED -j ACCEPT. To capture this in our model, it is first necessary to define the membership constraints of class InputDecision (a more specialised N amedf irewalldecision class): InputDecision N amedf irewalldecision haschain.inputchain Following this, one can now instantiate an individual (for example, id) of InputDecision, a class that contains the set of firewall INPUT decisions in our model, by assigning specified properties from individual id to individuals of relevant classes: < id >: InputDecision = < id, inputchain >: haschain < id, rel >: hasstate 5 Firewall Configuration Conflict Detection < id, est >: hasstate < id, accept >: hast arget Recall the example of shadowed firewall decisions in Section 2. A SWRL rule that tests for a shadowed decision is expressed as F orwarddecision(?x) F orwarddecision(?y) abox : hasp roperty(?ip1, hasip Member, protoip ) abox : hasp roperty(?ip2, hasip Member, protoip ) hassrcip (?x, protoip ) hasdstip (?x, protoip ) hasdstp ort(?x, portht T P ) hassrcip (?y,?ip1) hasdstip (?y,?ip2) hasdstp ort(?y, portht T P ) hast arget(?x, acceptt arget) hast arget(?y, dropt arget) hasruleorder(?x,?a) hasruleorder(?y,?b) swrlb : greatert han(?a,?b) differentf rom(?x,?y) Shadowed(?x) isshadowedt o(?x,?y) This states that, on discovering a FORWARD chain super-set firewall decision (?y) previous to the firewall decision in question (?x) then that subset decision (?x) should be re-classified under the class Shadowed and to have that subset decision (?x) set its isshadowedt o property to that of super-set decision (?y). Thus, firewall Decision 2 is classified as shadowed by firewall Decision 1. While automatic resolution of conflicts is not currently expressed in the Netfilter knowledge base, it can be added by expressing it in the ontology using DL and SWRL. This extensibility provides a plug and play approach to managing policies and is one of the advantages of using semantic DL knowledge. SWRL also provides an SQL-like notation that can be used to structure information retrieved by the DL knowledge base. For example, the query Shadowed(?x) isshadowedt o(?x,?y) query : select(?x,?y)
4 gives a list of tuples x y, where x is a decision and y the decision that shadows x. When executed against the knowledge in Table 1 it returns tuples 2 1, 5 3 and 5 4. The DL constrained ontology approach provides more than just classification and conflict detection. While we have codified extended forms of the conflict-tests in [6], our approach provides a more general framework for exploring firewall and network configurations. For example, queries such as what entities on subnet * can access the ssh service on (the firewall)? or list all open ports on accessible to entities other than the * subnet. 6 Discussion and Conclusion In this paper, we outline our approach to using an ontology to represent firewall configuration knowledge. This model effectively reflects the semantic knowledge that a firewall administrator should keep in their head when writing and/or updating firewall decisions. While it may be relatively straightforward to fully comprehend a configuration containing a small number of decisions, it is evident from the apparent complexity of the proposed DL model, that this human comprehension does not scale to a large number of decisions. It can be difficult for an administrator to fully appreciate the impact of adding or changing firewall decisions. Thus the need for automated support. We have implemented our DL model using Protégé [7] with its ontology DL plug-ins, and this provides an administrator with configuration models that are consistent, and more straightforward to navigate and comprehend. Thus, the administrator can have more confidence in the policies that they configure. A number of approaches have been proposed for the formal analysis of firewalls [8 12]. For example, model-checking techniques [8, 11] are used to test that a configuration of firewalls uphold a global routing policy that restricts certain data to certain sub-nets. In [10] constraint programming is used as an approach to finding suitable firewall rules from higher level policy constraints. The focus in these approaches is more on analyzing that firewall rules uphold particular correctness properties, or on synthesising firewall rules from specified correctness properties. While this notion of correctness does, in effect, provide semantics for firewall configuration under a limited number of a priori properties, it is not intended to provide a framework for general knowledge representation about firewalls. The DL approach, while not as expressive as the logics that underlie [8 12], is intended to allow the knowledge base to be extended and managed in general. This paper focuses on the issues of firewall conflicts classified by [6] as a useful case study to demonstrate the appropriateness of the DL approach in resolving firewall policy conflicts. The provision of reasoning, in particular within the context of OWA, provides the DL approach with greater flexibility and extendability for incorporating new knowledge. Our model not only caters for conflict firewall decision anomalies, it also provides a means to provide proper explanation for misconfigured firewall rules. Our DL model not only detects pair-wise conflicts between two firewall decisions (like the approach taken by [6]) but it can readily detect the conjunctions of partial conflicts in a set-wise fashion that may occur across multiple decisions in regard to a specified decision being analysed. For example, Decisions 3-5 of Table 1 captures the filtering of stateful outward ftp and ssh traffic of the firewall itself towards the * subnet and node respectively whereby connections are Established or Related. Our model can capture that Decision 5 is partially shadowed by the conjunction of a number of individual proceeding decisions namely 3 & 4 (ports and state). In general, DL provides a basis for extendability, interoperability and complex composition of other security domains of interest. For example, by developing new ontologies for application-level proxies, one can then model and reason about configurations that involve firewall decisions and proxy decisions. Conflict anomaly-style analysis could be carried out to determine how decisions of one security mechanism may interfere with the decisions of another.
5 References 1. Wool, A.: A Quantitative Study of Firewall Configuration Errors. COMPUTER, IEEE Computer Society Press, Vol. 37, No. 6, pp (2004) 2. Wack, J., Cutler, K., Pole, J.: Guidelines on Firewalls and Firewall Policy: Recommendations of the National Institute of Standards and Technology. NIST, Special Publication (2002) 3. Golnabi, K., Min, R., Khan, L., Al-Shaer, E.: Analysis of Firewall Policy Rule Using Data Mining Techniques. In the 10th IEEE/IFIP Network Operations and Management Symposium, (NOMS) (2006) 4. Baader, F., Calvanese, D., McGuinness, D., Nardi, D., Patel-Schneider, P.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press (2003) 5. Horrocks, I., Patel-Schneider, P.F., Boley, H., Tabet, S., Grosof, B., Dean, M.: SWRL: A Semantic Web Rule Language Combining OWL and RuleML. W3C Member Submission (2004) 6. Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict Classification and Analysis of Distributed Firewall Policies. In IEEE Journal on Selected Areas in Communications, Volume 1-1 (2005) 7. Gennari, J., Musen, M.A., Fergerson, R.W., Grosso, W.E., Crubezy, M., Eriksson, H., Noy, N.F., Tu., S.W.: The Evolution of Protege: An Environment for Knowledge-Based Systems Development. In: Proceedings of International Journal of Human-Computer Studies, Volume 58, Issue 1. (2003) 8. Guttman, J.D.: Filtering Postures: Local Enforcement for Global Security Policies. IEEE Symposium on Security and Privacy, Oakland (1997) 9. Mayer, A., Wool, A., Zishind, E.: Fang: A Firewall Analysis Engine IEEE Symposium on Security and Privacy, p (2000) 10. Eronen, P., Zitting, J.: An Expert System for Analyzing Firewall Rules. (In: In Proceedings of the 6th Nordic Workshop on Secure IT Systems (NordSec 2001), pages ) 11. Hazelhurst, S.: A Proposal for Dynamic Access Lists for TCP/IP Packet Filtering. South African Computer Journal, Vol. 33 (2004) 12. Marmorstein, R., Kearns, P.: A Tool for Automated iptables Firewall Analysis. (USENIX Annual Technical Conference, FREENIX Track)
Optimization of Firewall Filtering Rules by a Thorough Rewriting
LANOMS 2005-4th Latin American Network Operations and Management Symposium 77 Optimization of Firewall Filtering Rules by a Thorough Rewriting Yi Zhang 1 Yong Zhang 2 and Weinong Wang 3 1, 2, 3 Department
Packet Filtering Rule List Analysis
Filtering List Analysis Chotipat Pornavalai and Thawatchai Chomsiri Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang Ladkrabang, Bangkok 10520, Thailand. Abstract: Firewalls
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
Management of Exceptions on Access Control Policies
Management of Exceptions on Access Control Policies J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France, {frederic.cuppens,nora.cuppens}@enst-bretagne.fr
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
Firewall Configuration based on Specifications of Access Policy and Network Environment
Firewall Configuration based on Specifications of Access Policy and Network Environment A. Titov, V. Zaborovsky Saint-Petersburg State Polytechnical University, Russia [email protected], [email protected] Abstract
A Matrix Model for Designing and Implementing Multi-firewall Environments
A Matrix Model for Designing and Implementing Multi-firewall Environments Loye L. Ray Department of Cyber Security and Information Assurance, University of Maryland University College, 3501 University
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
Completing Description Logic Knowledge Bases using Formal Concept Analysis
Completing Description Logic Knowledge Bases using Formal Concept Analysis Franz Baader, 1 Bernhard Ganter, 1 Barış Sertkaya, 1 and Ulrike Sattler 2 1 TU Dresden, Germany and 2 The University of Manchester,
Consistency verification of stateful firewalls is not harder than the stateless case
RESEARCH Consistency verification of stateful firewalls is not harder than the stateless case LEVENTE BUTTYÁN, GÁBOR PÉK, TA VINH THONG Laboratory of Cryptography and Systems Security Budapest University
Design and Implementation of Firewall Policy Advisor Tools
Design and Implementation of Firewall Policy Advisor Tools Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems
Conflict Classification and Analysis of Distributed Firewall Policies
Conflict Classification and Analysis of Distributed Firewall Policies 1 Ehab Al-Shaer and Hazem Hamed School of Computer Science DePaul University, Chicago, USA Email: {ehab, hhamed}@cs.depaul.edu Raouf
Firewall Analysis with Policy- Based Host Classification
Firewall Analysis with Policy- Based Host Classification Robert Marmorstein and Phil Kearns The College of William and Mary ABSTRACT For administrators of large systems, testing and debugging a firewall
Firewall Queries. Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu 2 Department of Computer Science, Texas State University,
Firewall Queries Alex X. Liu 1, Mohamed G. Gouda 1, Huibo H. Ma 2, Anne HH. Ngu 2 1 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu
Reducing the Size of Rule Set in a Firewall
Reducing the Size of Rule Set in a Firewall MyungKeun Yoon Shigang Chen Zhan Zhang Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA 352 392 2713
The Protégé OWL Plugin: An Open Development Environment for Semantic Web Applications
The Protégé OWL Plugin: An Open Development Environment for Semantic Web Applications Holger Knublauch, Ray W. Fergerson, Natalya F. Noy and Mark A. Musen Stanford Medical Informatics, Stanford School
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
Supporting Rule System Interoperability on the Semantic Web with SWRL
Supporting Rule System Interoperability on the Semantic Web with SWRL Martin O Connor 1, Holger Knublauch 1, Samson Tu 1, Benjamin Grosof 2, Mike Dean 3, William Grosso 4, Mark Musen 1 1 Stanford Medical
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
Firewall and Its Policies Management
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Firewall Policy Anomaly Management with Optimizing Rule Order
Firewall Policy Anomaly Management with Optimizing Rule Order 1.Ms. Swati S. Kachare, 2 Dr. P.K. Deshmukh 1,Computer Department - Rajarshi Shahu College of Engg. Pune 2.Computer Department - Rajarshi Shahu
Complete Redundancy Detection in Firewalls
Complete Redundancy Detection in Firewalls Alex X. Liu and Mohamed G. Gouda Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, USA {alex, gouda}@cs.utexas.edu
Methods for Firewall Policy Detection and Prevention
Methods for Firewall Policy Detection and Prevention Hemkumar D Asst Professor Dept. of Computer science and Engineering Sharda University, Greater Noida NCR Mohit Chugh B.tech (Information Technology)
Semantic Variability Modeling for Multi-staged Service Composition
Semantic Variability Modeling for Multi-staged Service Composition Bardia Mohabbati 1, Nima Kaviani 2, Dragan Gašević 3 1 Simon Fraser University, 2 University of British Columbia, 3 Athabasca University,
A Meta-model of Business Interaction for Assisting Intelligent Workflow Systems
A Meta-model of Business Interaction for Assisting Intelligent Workflow Systems Areti Manataki and Yun-Heh Chen-Burger Centre for Intelligent Systems and their Applications, School of Informatics, The
Clinician-Led Development of Electronic Health Records Systems
Clinician-Led Development of Electronic Health Records Systems a John CHELSOM 1, Raju AHLUWALIA b, a and Naveed DOGAR a Centre for Health Informatics, City University, London b HS, W Thames Orthopaedic
Semantic Interoperability for Data Integration Framework using Semantic Web Services and Rule-based Inference: A case study in healthcare domain
Semantic Interoperability for Data Integration Framework using Semantic Web Services and Rule-based Inference: 1 Suphachoke Sonsilphong, 2 Ngamnij Arch-int Semantic Mining Information Integration Laboratory
II. BASICS OF PACKET FILTERING
Use of Formal models for the Firewall Policy Optimization ShatanandPatil* and B. B. Meshram** *(Department of Computer Technology, Veermata Jijabai Technical Institute, Mumbai 19) *(Department of Computer
How To Write A Policy Based Networking System For Bgg
Utilizing Semantic Policies for Secure BGP Route Dissemination Sethuram Balaji Kodeswaran, Palanivel Kodeswaran, Anupam Joshi Department of Computer Science and Electrical Engineering University of Maryland
Comparing and debugging firewall rule tables
Comparing and debugging firewall rule tables L. Lu, R. Safavi-Naini, J. Horton and W. Susilo Abstract: Firewalls are one of the essential components of secure networks. However, configuring firewall rule
Data Validation with OWL Integrity Constraints
Data Validation with OWL Integrity Constraints (Extended Abstract) Evren Sirin Clark & Parsia, LLC, Washington, DC, USA [email protected] Abstract. Data validation is an important part of data integration
IP Address: the per-network unique identifier used to find you on a network
Linux Networking What is a network? A collection of devices connected together Can use IPv4, IPv6, other schemes Different devices on a network can talk to each other May be walls to separate different
Rules, RIF and RuleML
Rules, RIF and RuleML Rule Knowledge l Rules generalize facts by making them conditional on other facts (often via chaining through further rules) l Rules generalize taxonomies via multiple premises, n-ary
ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS
ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS Hasni Neji and Ridha Bouallegue Innov COM Lab, Higher School of Communications of Tunis, Sup Com University of Carthage, Tunis, Tunisia. Email: [email protected];
Firewall Examples. Using a firewall to control traffic in networks
Using a firewall to control traffic in networks 1 1 Example Network 1 2 1.0/24 1.2.0/24.4 1.0.0/16 Rc 5.6 4.0/24 2 Consider this example internet which has: 6 subnets (blue ovals), each with unique network
The Semantic Web Rule Language. Martin O Connor Stanford Center for Biomedical Informatics Research, Stanford University
The Semantic Web Rule Language Martin O Connor Stanford Center for Biomedical Informatics Research, Stanford University Talk Outline Rules and the Semantic Web Basic SWRL Rules SWRL s Semantics SWRLTab:
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
First Steps to Using PacketShaper ISP
First Steps to Using PacketShaper ISP TABLE OF CONTENTS OVERVIEW...1 DETERMINING YOUR PACKETSHAPER ISP DEPLOYMENT STRATEGY...2 ISP Upstream Link...2 Cable or DSL Head End...2 USING THE CLASSIFICATION-ACCELERATOR
How To Write A Drupal 5.5.2.2 Rdf Plugin For A Site Administrator To Write An Html Oracle Website In A Blog Post In A Flashdrupal.Org Blog Post
RDFa in Drupal: Bringing Cheese to the Web of Data Stéphane Corlosquet, Richard Cyganiak, Axel Polleres and Stefan Decker Digital Enterprise Research Institute National University of Ireland, Galway Galway,
Information Services for Smart Grids
Smart Grid and Renewable Energy, 2009, 8 12 Published Online September 2009 (http://www.scirp.org/journal/sgre/). ABSTRACT Interconnected and integrated electrical power systems, by their very dynamic
Developing a Web-Based Application using OWL and SWRL
Developing a Web-Based Application using OWL and SWRL Martin J. O Connor, Ravi Shankar, Csongor Nyulas, Samson Tu, Amar Das Stanford Medical Informatics, Stanford University, Stanford, CA 94305-5479 {martin.oconnor,
Integrated management of network and security devices in IT infrastructures.
Integrated management of network and security devices in IT infrastructures. Bart Vanbrabant, Wouter Joosen {bart.vanbrabant, wouter.joosen}@cs.kuleuven.be DistriNet, Dept. of Computer Science, K.U.Leuven,
What is Firewall Builder
Firewall Builder The Problem In a heterogeneous environment, the administrator needs to be proficient with many different tools and CLI Administrator should understand how various firewalls differ in their
A semantic based tool for firewall configuration
A semantic based tool for firewall configuration (Extended abstract) P. Adão SQIG IT, Instituto de Telecomunicações and Instituto Superior Técnico, Universidade de Lisboa, Portugal Email: [email protected]
Jambalaya: Interactive visualization to enhance ontology authoring and knowledge acquisition in Protégé
Jambalaya: Interactive visualization to enhance ontology authoring and knowledge acquisition in Protégé Margaret-Anne Storey 1,4 Mark Musen 2 John Silva 3 Casey Best 1 Neil Ernst 1 Ray Fergerson 2 Natasha
The Ontological Approach for SIEM Data Repository
The Ontological Approach for SIEM Data Repository Igor Kotenko, Olga Polubelova, and Igor Saenko Laboratory of Computer Science Problems, Saint-Petersburg Institute for Information and Automation of Russian
Craig Pelkie Bits & Bytes Programming, Inc. [email protected]
Craig Pelkie Bits & Bytes Programming, Inc. [email protected] The Basics of IP Packet Filtering Edition IPFILTER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center, CA 92082 [email protected]
An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization
An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization Yogita Nikhare 1 andprof. Anil Bende 2 1 M.TechScholar, Department of Computer Science
Defining a benchmark suite for evaluating the import of OWL Lite ontologies
UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA FREE UNIVERSITY OF BOLZANO FACULTY OF COMPUTER SCIENCE EUROPEAN MASTER IN COMPUTATIONAL LOGIC MASTER THESIS Defining a benchmark suite for evaluating
Application of ontologies for the integration of network monitoring platforms
Application of ontologies for the integration of network monitoring platforms Jorge E. López de Vergara, Javier Aracil, Jesús Martínez, Alfredo Salvador, José Alberto Hernández Networking Research Group,
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model
94 IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model Naveen Mukkapati,
FIREWALL CLEANUP WHITE PAPER
FIREWALL CLEANUP WHITE PAPER Firewall Cleanup Recommendations Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity Table of Contents Executive Summary... 3 The
Linux MPS Firewall Supplement
Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel
Ontological IDS Monitoring on Defined Attack
ISSN (Online): 2319 7064 Ontological IDS Monitoring on Defined Attack Vinod Kumar Shukla 1, D. B. Ojha 2 1 Research Scholar, Mewar University, Chittorgarh, Rajasthan, India 2 Professor, Mewar University,
A Metamodeling Approach for Reasoning about Requirements
A Metamodeling Approach for Reasoning about Requirements Arda Goknil, Ivan Kurtev, Klaas van den Berg Software Engineering Group, University of Twente, 7500 AE Enschede, the Netherlands {a.goknil, kurtev,
Rules and Business Rules
OCEB White Paper on Business Rules, Decisions, and PRR Version 1.1, December 2008 Paul Vincent, co-chair OMG PRR FTF TIBCO Software Abstract The Object Management Group s work on standards for business
UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004
[CRT14] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004 Date: Wednesday 27 th May 2015 Time: 14:00 16:00
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Semantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Ontological Identification of Patterns for Choreographing Business Workflow
University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business
Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain
Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain Kamarasa V D S Santhosh M.Tech Student, Department of ComputerScience & Engineering, School of Technology, Gitam University,
Requirements for Software Deployment Languages and Schema
Requirements for Software Deployment Languages and Schema Richard S. Hall, Dennis Heimbigner, Alexander L. Wolf Software Engineering Research Laboratory Department of Computer Science University of Colorado
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Ontology and automatic code generation on modeling and simulation
Ontology and automatic code generation on modeling and simulation Youcef Gheraibia Computing Department University Md Messadia Souk Ahras, 41000, Algeria [email protected] Abdelhabib Bourouis
Security Issues for the Semantic Web
Security Issues for the Semantic Web Dr. Bhavani Thuraisingham Program Director Data and Applications Security The National Science Foundation Arlington, VA On leave from The MITRE Corporation Bedford,
A very short history of networking
A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the
