Misconfiguration Management of Network Security Components

12/16/2019
by   Frédéric Cuppens, et al.
0

Many companies and organizations use firewalls to control the access to their network infrastructure. Firewalls are network security components which provide means to filter traffic within corporate networks, as well as to police incoming and outcoming interaction with the Internet. For this purpose, it is necessary to configure firewalls with a set of filtering rules. Nevertheless, the existence of errors in a set of filtering rules is very likely to degrade the network security policy. The discovering and removal of these configuration errors is a serious and complex problem to solve. In this paper, we present a set of algorithms for such a management. Our approach is based on the analysis of relationships between the set of filtering rules. Then, a subsequent rewriting of rules will derive from an initial firewall setup – potentially misconfigured – to an equivalent one completely free of errors. At the same time, the algorithms will detect useless rules in the initial firewall configuration.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/07/2022

Systematic review of automatic translation of high-level security policy into firewall rules

Firewalls are security devices that perform network traffic filtering. T...
research
01/04/2019

Practical Verifiable In-network Filtering for DDoS defense

In light of ever-increasing scale and sophistication of modern DDoS atta...
research
03/10/2023

Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules

Insecure default values in software settings can be exploited by attacke...
research
12/28/2017

Learning to Customize Network Security Rules

Security is a major concern for organizations who wish to leverage cloud...
research
03/16/2020

An Automatic Attribute Based Access Control Policy Extraction from Access Logs

With the rapid advances in computing and information technologies, tradi...
research
05/23/2023

REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response

Automated Intelligent Cyberdefense Agents (AICAs) that are part Intrusio...

Please sign up or login with your details

Forgot password? Click here to reset