Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2006: Data and Applications Security XX pp 15–29Cite as

  1. Home
  2. Data and Applications Security XX
  3. Conference paper
Detection and Resolution of Anomalies in Firewall Policy Rules

Detection and Resolution of Anomalies in Firewall Policy Rules

  • Muhammad Abedin18,
  • Syeda Nessa18,
  • Latifur Khan18 &
  • …
  • Bhavani Thuraisingham18 
  • Conference paper
  • 2747 Accesses

  • 23 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4127)

Abstract

A firewall is a system acting as an interface of a network to one or more external networks. It implements the security policy of the network by deciding which packets to let through based on rules defined by the network administrator. Any error in defining the rules may compromise the system security by letting unwanted traffic pass or blocking desired traffic. Manual definition of rules often results in a set that contains conflicting, redundant or overshadowed rules, resulting in anomalies in the policy. Manually detecting and resolving these anomalies is a critical but tedious and error prone task. Existing research on this problem have been focused on the analysis and detection of the anomalies in firewall policy. Previous works define the possible relations between rules and also define anomalies in terms of the relations and present algorithms to detect the anomalies by analyzing the rules. In this paper, we discuss some necessary modifications to the existing definitions of the relations. We present a new algorithm that will simultaneously detect and resolve any anomaly present in the policy rules by necessary reorder and split operations to generate a new anomaly free rule set. We also present proof of correctness of the algorithm. Then we present an algorithm to merge rules where possible in order to reduce the number of rules and hence increase efficiency of the firewall.

Keywords

  • Packet Filters
  • Network Security
  • Firewalls
  • Anomalies
  • Security Policy

Chapter PDF

Download to read the full chapter text

References

  1. Al-Shaer, E., Hamed, H.: Design and implementation of firewall policy advisor tools. Technical Report CTI-techrep0801, School of Computer Science Telecommunications and Information Systems, DePaul University (August 2002)

    Google Scholar 

  2. Al-Shaer, E., Hamed, H.: Firewall policy advisor for anomaly detection and rule editing. In: IEEE/IFIP Integrated Management Conference (IM 2003) (March 2003)

    Google Scholar 

  3. Al-Shaer, E., Hamed, H.: Discovery of policy anomalies in distributed firewalls. In: Proc. 23rd Conf. IEEE Communications Soc. (INFOCOM 2004), vol. 23(1), pp. 2605–2616 (March 2004)

    Google Scholar 

  4. Al-Shaer, E., Hamed, H.: Taxonomy of conflicts in network security policies. IEEE Communications Magazine 44(3) (March 2006)

    Google Scholar 

  5. Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC) 23(10) (October 2005)

    Google Scholar 

  6. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, Cambridge (2001)

    MATH  Google Scholar 

  7. Eppstein, D., Muthukrishnan, S.: Internet packet filter management and rectangle geometry. In: Proceedings of the 12th Annual ACM–SIAM Symposium on Discrete Algorithms (SODA 2001), pp. 827–835 (January 2001)

    Google Scholar 

  8. Eronen, P., Zitting, J.: An expert system for analyzing firewall rules. In: Proceedings of the 6th Nordic Workshop on Secure IT Systems (NordSec 2001), pp. 100–107 (November 2001)

    Google Scholar 

  9. Fu, Z., Wu, S.F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C.: IPSec/VPN security policy: Correctness, conflict detection, and resolution. In: Proceedings of Policy 2001 Workshop (January 2001)

    Google Scholar 

  10. Golnabi, K., Min, R.K., Khan, L., Al-Shaer, E.: Analysis of firewall policy rules using data mining techniques. In: IEEE/IFIP Network Operations and Management Symposium (NOMS 2006) (April 2006)

    Google Scholar 

  11. Hari, A., Suri, S., Parulkar, G.M.: Detecting and resolving packet filter conflicts. In: INFOCOM, vol. 3, pp. 1203–1212 (March 2000)

    Google Scholar 

  12. Hazelhurst, S.: Algorithms for analysing firewall and router access lists. Technical Report TR-WitsCS-1999-5, Department of Computer Science, University of the Witwatersrand, South Africa (July 1999)

    Google Scholar 

  13. Mayer, A., Wool, A., Ziskind, E.: Fang: A firewall analysis engine. In: Proceedings, IEEE Symposium on Security and Privacy, pp. 177–187. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department Of Computer Science, The University of Texas at Dallas, USA

    Muhammad Abedin, Syeda Nessa, Latifur Khan & Bhavani Thuraisingham

Authors
  1. Muhammad Abedin
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Syeda Nessa
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Latifur Khan
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Bhavani Thuraisingham
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Italy

    Ernesto Damiani

  2. The Logistics Institute, Northeastern University, Shenyang, China

    Peng Liu

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 IFIP International Federation for Information Processing

About this paper

Cite this paper

Abedin, M., Nessa, S., Khan, L., Thuraisingham, B. (2006). Detection and Resolution of Anomalies in Firewall Policy Rules. In: Damiani, E., Liu, P. (eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11805588_2

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11805588_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36796-3

  • Online ISBN: 978-3-540-36799-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature