Inconsistency Detection System for Security Policy and Firewall Policy

Yi Yin, Xiaodong Xu, Y. Katayama, N. Takahashi
{"title":"Inconsistency Detection System for Security Policy and Firewall Policy","authors":"Yi Yin, Xiaodong Xu, Y. Katayama, N. Takahashi","doi":"10.1109/IC-NC.2010.45","DOIUrl":null,"url":null,"abstract":"Packet filtering in firewall either accepts or denies network packets based upon a set of pre-defined filters called firewall policy. Firewall policy is designed under the instruction of security policy. A network security policy is a generic document that outlines the needs for computer network access permissions. And it determines how firewall filters are designed. If inconsistencies, such as redundant filters, insufficient filters or contradict filters, exist between security policy and firewall policy, firewall policy could not filter packets exactly, and the network protected by the firewall will be affected. To resolve this problem, we propose an inconsistency detection system to detect the inconsistencies between the security policy and firewall policy. When the administrator could not get host IP addresses, port number and other specific values, according to the network configurations, our proposed system could transform the network security policy and firewall policy to the same range value, represent and analyze their spatial relationships to detect their inconsistencies. The proposed system has been successfully implemented in a prototype system. We have been confirmed the effectiveness of the proposed system.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 First International Conference on Networking and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC-NC.2010.45","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Packet filtering in firewall either accepts or denies network packets based upon a set of pre-defined filters called firewall policy. Firewall policy is designed under the instruction of security policy. A network security policy is a generic document that outlines the needs for computer network access permissions. And it determines how firewall filters are designed. If inconsistencies, such as redundant filters, insufficient filters or contradict filters, exist between security policy and firewall policy, firewall policy could not filter packets exactly, and the network protected by the firewall will be affected. To resolve this problem, we propose an inconsistency detection system to detect the inconsistencies between the security policy and firewall policy. When the administrator could not get host IP addresses, port number and other specific values, according to the network configurations, our proposed system could transform the network security policy and firewall policy to the same range value, represent and analyze their spatial relationships to detect their inconsistencies. The proposed system has been successfully implemented in a prototype system. We have been confirmed the effectiveness of the proposed system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
安全策略与防火墙策略不一致检测系统
防火墙中的包过滤根据一组预定义的过滤器(称为防火墙策略)接受或拒绝网络数据包。防火墙策略是在安全策略的指导下设计的。网络安全策略是概述计算机网络访问权限需求的通用文档。它还决定了如何设计防火墙过滤器。如果安全策略与防火墙策略之间存在过滤冗余、过滤不充分、过滤矛盾等不一致的情况,将导致防火墙策略无法准确过滤报文,从而影响防火墙所保护的网络。为了解决这个问题,我们提出了一个不一致检测系统来检测安全策略和防火墙策略之间的不一致。当管理员无法获取主机IP地址、端口号等具体值时,根据网络配置,我们提出的系统可以将网络安全策略和防火墙策略转换为相同的范围值,并表示和分析它们之间的空间关系,以检测它们之间的不一致性。该系统已在原型系统中成功实现。我们已经证实了所提议的制度的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Evaluation on Sensor Network Technologies for AMI Associated Mudslide Warning System Power Saving in Mobile Devices Using Context-Aware Resource Control An Adaptive Timeout Strategy for Profiling UDP Flows Adaptive Prefetching Scheme for Peer-to-Peer Video-on-Demand Systems with a Media Server Softassign and EM-ICP on GPU
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1