Ahmed et al., 2010 - Google Patents
Safe and efficient strategies for updating firewall policiesAhmed et al., 2010
- Document ID
- 6988942040327326126
- Author
- Ahmed Z
- Imine A
- Rusinowitch M
- Publication year
- Publication venue
- International Conference on Trust, Privacy and Security in Digital Business
External Links
Snippet
Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require automated tools providing a user-friendly environment to specify, configure and safely deploy a target …
- 235000013615 non-nutritive sweetener 0 description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9553845B1 (en) | Methods for validating and testing firewalls and devices thereof | |
EP3343841B1 (en) | Access relationships in a computer system | |
US7257815B2 (en) | Methods and system of managing concurrent access to multiple resources | |
CN113055369B (en) | Security in software defined networks | |
EP1634175B1 (en) | Multilayer access control security system | |
US20060164199A1 (en) | Network appliance for securely quarantining a node on a network | |
US20090238474A1 (en) | String searching facility | |
US20220159016A1 (en) | Network data traffic identification | |
Abbes et al. | Detection of firewall configuration errors with updatable tree | |
US11388144B2 (en) | Session setup in network applications | |
Lagrasse et al. | Digital forensic readiness framework for software-defined networks using a trigger-based collection mechanism | |
US11700258B2 (en) | Access relationships in a computer system | |
Al-Shaer | Automated firewall analytics: Design, configuration and optimization | |
Krit et al. | Overview of firewalls: Types and policies: Managing windows embedded firewall programmatically | |
Gouda et al. | Verification of distributed firewalls | |
Ahmed et al. | Safe and efficient strategies for updating firewall policies | |
KR100372798B1 (en) | System and method for dynamic micro placement of ip connection filters | |
US8892492B2 (en) | Declarative network access control | |
Bouhoula et al. | Firewall filtering rules analysis for anomalies detection | |
Karoui et al. | Formal specification, verification and correction of security policies based on the decision tree approach | |
US20120324569A1 (en) | Rule compilation in a firewall | |
Thakar et al. | An approach to improve performance of a packet-filtering firewall | |
Bouhoula et al. | A security policy query engine for fully automated resolution of anomalies in firewall configurations | |
Bezzazi et al. | Optimized strategy of deployment firewall policies | |
Fuertes et al. | Software-based computing platform as an experimental topology assembled to detect and mitigate DDoS attacks using virtual environments |