Abstract
Firewalls are the backbone of enterprise security, ensuring that most large corporations and organizations keep their privacy. A firewall's complexity and processing time increase as the amount of its rule set grows. The policies in the firewall configuration determine the range of its efficiency in maintaining security. Despite the fact that firewall rules have been established and set, it appears to be a difficult and error-prone operation. (1) Identification of conflicts and challenges involved in legacy firewalls, and (2) Redundancy removal, innovation for rule insertion, and implemention modification are the two primary tasks done and proposed in this study. These measures would eliminate the network vulnerability brought on by a malfunctioning firewall.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yuan L, Chen H, Mai J, Chuah C, Su Z, Mohapatra P, Davis C (2006) Fireman: a Toolkit for firewall modeling and analysis. In: Proceeding of IEEE symposium security and privacy, p 15
Lupu E, Sloman M (1999) Conflicts in policy-based distribute systems management. IEEE Trans Softw Eng 25(6):852–869
Hu H, Ahn G, Kulkarni K (2011) Anomaly discovery and resolution in web access control policies. In: Proceedings of 16th ACM symposium access control models and technologies, pp 165–174
Yuan L, Chuah C, Mohapatra P (2007) ProgME: towards programmable network measurement. ACM SIGCOMM Comput Comm Rev 37(4):108
Bentley J, Ottmann T (1979) Algorithms for reporting and counting geometric intersections. IEEE Trans Comput 28(9)
Tapiador JE, Orfila T (2015) Key-recovery attacks on kids, a keyed anomaly detection system. IEEE Trans Depend Secure Comput 12(3)
Jin J, Ahn G, Hu H, Covington M, Zhang X (2009) Patient-centric authorization framework for sharing electronic health records. In: Proceedings of 14th ACM symposium access control models and technologies, pp 125–134
Wool A (2010) Trends in firewall configuration errors: measuring the holes in Swiss Cheese. IEEE Internet Comput 14(4):58–65
Jin J, Ahn G, Hu H, Covington M, Zhang X (2011) Patient-centric authorization framework for electronic healthcare services. Comput Secur 30(2):116–127
Moses T. Extensible access control markup language (XACML), Version 2.0, OasisStandard. Internet, http://docs.oasisopen.org/xacml/2.0/accesscontrol-xacml-2.0-orespec-os.pdf
Mell P, Scarfone K, Romanosky S (2007) A complete guide to the common vulnerability scoring system version 2.0. Published by FIRST—Forum of Incident Response and Security Teams
Misherghi G, Yuan L, Su Z, Chuah C-N, Chen H (2008) A general framework for benchmarking firewall optimization techniques. IEEE Trans Netw Service Manage 5(4):227–238
Wang L, Singhal A, Jajodia S (2008) Measuring network security using dynamic Bayesian network. In: Proceedings of fourth ACM workshop quality of protection
El-Atawy A, Ibrahim K, Hamed H, Al- Shaer E (2005) Policy segmentation for intelligent firewall testing. In: Proceeding of first workshop secure network protocols (NPSec ’05)
Kasif TA, Catal C, Tekinerdogan B (2021) A firewall policy anomaly detection framework for reliable network security. IEEE Trans Rel. https://doi.org/10.1109/TR.2021.3089511
Valenza, Cheminod M (2020) An optimized firewall anomaly resolution. J Internet Service Inf Secur 10(1):22–37
Li N, Wang Q, Qardaji W, Bertino E, Rao P, Lobo J, Lin D (2009) Access control policy combining: theory meets practice. In: Proceedings of 14th ACM symposium access control models and technologies, pp 135–144
Jajodia S, Samarati P, Subrahmanian VS (1997) A logical language for expressing authorizations. In: Proceedings of IEEE symposium security and privacy, pp 31–42
Spinoso VS, Sisto R (2019) Formally specifying and checking policies and anomalies in service function chaining. J Netw Comput Appl 146:102419
Bagheri, Shameli-Sendi A (2020) Dynamic firewall decomposition and composition in the cloud. IEEE Trans Inf Forensics Secur 15:3526–3539
Al-Shaer E, Hamed H (2004) Discovery of policy anomalies in distributed firewalls. IEEE INFOCOM ’04 4:2605–2616
Alfaro J, Boulahia-Cuppens N, Cuppens F (2008) Complete analysis of configuration rules to guarantee reliable network security policies. Int’l J Inf Secur 7(2):103–122
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vijay, M., Devika, R., Priyangha, B.S. (2022). Anomaly Detection System and Resolution of Anomalies for Firewall Policies. In: Asokan, R., Ruiz, D.P., Baig, Z.A., Piramuthu, S. (eds) Smart Data Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-3311-0_12
Download citation
DOI: https://doi.org/10.1007/978-981-19-3311-0_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-3310-3
Online ISBN: 978-981-19-3311-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)