An optimized approach for assisted firewall anomaly resolution

D Bringhenti, L Seno, F Valenza - IEEE Access, 2023 - ieeexplore.ieee.org
The security configuration of firewalls is a complex task that is commonly performed
manually by network administrators. As a consequence, among the rules composing firewall …

Detection of firewall configuration errors with updatable tree

T Abbes, A Bouhoula, M Rusinowitch - International Journal of Information …, 2016 - Springer
The fundamental goals of security policy are to allow uninterrupted access to the network
resources for authenticated users and to deny access to unauthenticated users. For this …

Automatic verification of conformance of firewall configurations to security policies

NB Youssef, A Bouhoula… - 2009 ieee symposium on …, 2009 - ieeexplore.ieee.org
The configuration of firewalls is highly error prone and automated solution are needed in
order to analyze its correctness. We propose a formal and automatic method for checking …

Atomizing firewall policies for anomaly analysis and resolution

D Bringhenti, S Bussa, R Sisto… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Nowadays, the security management of packet filtering firewall policies got complicated due
to the evolution of modern computer networks, characterized by growing size and …

Automatic verification of firewall configuration with respect to security policy requirements

S Matsumoto, A Bouhoula - Proceedings of the International Workshop on …, 2009 - Springer
Firewalls are key security components in computer networks. They filter network traffics
based on an ordered list of filtering rules. Firewall configurations must be correct and …

Optimising rule order for a packet filtering firewall

I Mothersole, MJ Reed - 2011 Conference on Network and …, 2011 - ieeexplore.ieee.org
A heuristic approximation algorithm that can optimise the order of firewall rules to minimise
packet matching is presented. It has been noted that firewall operators tend to make use of …

Non‐dominated sorting particle swarm optimization (NSPSO) and network security policy enforcement for Policy Space Analysis

T Sureshkumar, M Lingaraj, B Anand… - International Journal …, 2018 - Wiley Online Library
Network operators depend on security services with the aim of safeguarding their IT
infrastructure. Various types of network security policies are employed on a global scale and …

Automatic conformance verification of distributed firewalls to security requirements

NBSB Youssef, A Bouhoula - 2010 IEEE Second International …, 2010 - ieeexplore.ieee.org
Distributed firewalls are often deployed by large enterprises to filter the network traffic.
However, it has been observed that the resulting complex firewall network is highly error …

Classification and discovery of rule misconfigurations in intrusion detection and response devices

N Stakhanova, Y Li, AA Ghorbani - 2009 World Congress on …, 2009 - ieeexplore.ieee.org
The signature-based intrusion detection is one of the most commonly used techniques
implemented in modern intrusion detection systems (IDS). Being based on a set of rules, ie …

Automatic verification of security policies in firewalls with dynamic rule sequence

A Gawanmeh - 2014 11th International Conference on …, 2014 - ieeexplore.ieee.org
Security policies play an important role in the security of communication networks. They are
normally defined at a high level of abstraction and implemented in firewalls, which are the …