期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus 被引量:2
1
作者 Subana Thanasegaran Yi Yin +2 位作者 Yuichiro Tateiwa Yoshiaki Katayama Naohisa Takahashi 《International Journal of Communications, Network and System Sciences》 2011年第11期683-695,共13页
Firewalls use packet filtering to either accept or deny packets on the basis of a set of predefined rules called filters. The firewall forms the initial layer of defense and protects the network from unauthorized acce... Firewalls use packet filtering to either accept or deny packets on the basis of a set of predefined rules called filters. The firewall forms the initial layer of defense and protects the network from unauthorized access. However, maintaining firewall policies is always an error prone task, because the policies are highly complex. Conflict is a misconfiguration that occurs when a packet matches two or more filters. The occurrence of conflicts in a firewall policy makes the filters either redundant or shadowed, and as a result, the network does not reflect the actual configuration of the firewall policy. Hence, it is necessary to detect conflicts to keep the filters meaningful. Even though geometry-based conflict detection provides an exhaustive method for error classification, when the number of filters and headers increases, the demands on memory and computation time increase. To solve these two issues, we make two main contributions. First, we propose a topology-based conflict detection system that computes the topological relationship of the filters to detect the conflicts. Second, we propose a systematic implementation method called BISCAL (a bit-vector-based spatial calculus) to implement the proposed system and remove irrelevant data from the conflict detection computation. We perform a mathematical analysis as well as experimental evaluations and find that the amount of data needed for topology is only one-fourth of that needed for geometry. 展开更多
关键词 PACKET Filtering misconfiguration Network Security SPATIAL Analysis
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部