[go: up one dir, main page]

Ahmed et al., 2010 - Google Patents

Safe and efficient strategies for updating firewall policies

Ahmed et al., 2010

Document ID
6988942040327326126
Author
Ahmed Z
Imine A
Rusinowitch M
Publication year
Publication venue
International Conference on Trust, Privacy and Security in Digital Business

External Links

Snippet

Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require automated tools providing a user-friendly environment to specify, configure and safely deploy a target …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
US9553845B1 (en) Methods for validating and testing firewalls and devices thereof
EP3343841B1 (en) Access relationships in a computer system
US7257815B2 (en) Methods and system of managing concurrent access to multiple resources
CN113055369B (en) Security in software defined networks
EP1634175B1 (en) Multilayer access control security system
US20060164199A1 (en) Network appliance for securely quarantining a node on a network
US20090238474A1 (en) String searching facility
US20220159016A1 (en) Network data traffic identification
Abbes et al. Detection of firewall configuration errors with updatable tree
US11388144B2 (en) Session setup in network applications
Lagrasse et al. Digital forensic readiness framework for software-defined networks using a trigger-based collection mechanism
US11700258B2 (en) Access relationships in a computer system
Al-Shaer Automated firewall analytics: Design, configuration and optimization
Krit et al. Overview of firewalls: Types and policies: Managing windows embedded firewall programmatically
Gouda et al. Verification of distributed firewalls
Ahmed et al. Safe and efficient strategies for updating firewall policies
KR100372798B1 (en) System and method for dynamic micro placement of ip connection filters
US8892492B2 (en) Declarative network access control
Bouhoula et al. Firewall filtering rules analysis for anomalies detection
Karoui et al. Formal specification, verification and correction of security policies based on the decision tree approach
US20120324569A1 (en) Rule compilation in a firewall
Thakar et al. An approach to improve performance of a packet-filtering firewall
Bouhoula et al. A security policy query engine for fully automated resolution of anomalies in firewall configurations
Bezzazi et al. Optimized strategy of deployment firewall policies
Fuertes et al. Software-based computing platform as an experimental topology assembled to detect and mitigate DDoS attacks using virtual environments