Skip to main content

Anomaly Detection System and Resolution of Anomalies for Firewall Policies

  • Conference paper
  • First Online:
Smart Data Intelligence

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Firewalls are the backbone of enterprise security, ensuring that most large corporations and organizations keep their privacy. A firewall's complexity and processing time increase as the amount of its rule set grows. The policies in the firewall configuration determine the range of its efficiency in maintaining security. Despite the fact that firewall rules have been established and set, it appears to be a difficult and error-prone operation. (1) Identification of conflicts and challenges involved in legacy firewalls, and (2) Redundancy removal, innovation for rule insertion, and implemention modification are the two primary tasks done and proposed in this study. These measures would eliminate the network vulnerability brought on by a malfunctioning firewall.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yuan L, Chen H, Mai J, Chuah C, Su Z, Mohapatra P, Davis C (2006) Fireman: a Toolkit for firewall modeling and analysis. In: Proceeding of IEEE symposium security and privacy, p 15

    Google Scholar 

  2. Lupu E, Sloman M (1999) Conflicts in policy-based distribute systems management. IEEE Trans Softw Eng 25(6):852–869

    Article  Google Scholar 

  3. Hu H, Ahn G, Kulkarni K (2011) Anomaly discovery and resolution in web access control policies. In: Proceedings of 16th ACM symposium access control models and technologies, pp 165–174

    Google Scholar 

  4. Yuan L, Chuah C, Mohapatra P (2007) ProgME: towards programmable network measurement. ACM SIGCOMM Comput Comm Rev 37(4):108

    Article  Google Scholar 

  5. Bentley J, Ottmann T (1979) Algorithms for reporting and counting geometric intersections. IEEE Trans Comput 28(9)

    Google Scholar 

  6. Tapiador JE, Orfila T (2015) Key-recovery attacks on kids, a keyed anomaly detection system. IEEE Trans Depend Secure Comput 12(3)

    Google Scholar 

  7. Jin J, Ahn G, Hu H, Covington M, Zhang X (2009) Patient-centric authorization framework for sharing electronic health records. In: Proceedings of 14th ACM symposium access control models and technologies, pp 125–134

    Google Scholar 

  8. Wool A (2010) Trends in firewall configuration errors: measuring the holes in Swiss Cheese. IEEE Internet Comput 14(4):58–65

    Article  Google Scholar 

  9. Jin J, Ahn G, Hu H, Covington M, Zhang X (2011) Patient-centric authorization framework for electronic healthcare services. Comput Secur 30(2):116–127

    Article  Google Scholar 

  10. Moses T. Extensible access control markup language (XACML), Version 2.0, OasisStandard. Internet, http://docs.oasisopen.org/xacml/2.0/accesscontrol-xacml-2.0-orespec-os.pdf

  11. Mell P, Scarfone K, Romanosky S (2007) A complete guide to the common vulnerability scoring system version 2.0. Published by FIRST—Forum of Incident Response and Security Teams

    Google Scholar 

  12. Misherghi G, Yuan L, Su Z, Chuah C-N, Chen H (2008) A general framework for benchmarking firewall optimization techniques. IEEE Trans Netw Service Manage 5(4):227–238

    Article  Google Scholar 

  13. Wang L, Singhal A, Jajodia S (2008) Measuring network security using dynamic Bayesian network. In: Proceedings of fourth ACM workshop quality of protection

    Google Scholar 

  14. El-Atawy A, Ibrahim K, Hamed H, Al- Shaer E (2005) Policy segmentation for intelligent firewall testing. In: Proceeding of first workshop secure network protocols (NPSec ’05)

    Google Scholar 

  15. Kasif TA, Catal C, Tekinerdogan B (2021) A firewall policy anomaly detection framework for reliable network security. IEEE Trans Rel. https://doi.org/10.1109/TR.2021.3089511

  16. Valenza, Cheminod M (2020) An optimized firewall anomaly resolution. J Internet Service Inf Secur 10(1):22–37

    Google Scholar 

  17. Li N, Wang Q, Qardaji W, Bertino E, Rao P, Lobo J, Lin D (2009) Access control policy combining: theory meets practice. In: Proceedings of 14th ACM symposium access control models and technologies, pp 135–144

    Google Scholar 

  18. Jajodia S, Samarati P, Subrahmanian VS (1997) A logical language for expressing authorizations. In: Proceedings of IEEE symposium security and privacy, pp 31–42

    Google Scholar 

  19. Spinoso VS, Sisto R (2019) Formally specifying and checking policies and anomalies in service function chaining. J Netw Comput Appl 146:102419

    Google Scholar 

  20. Bagheri, Shameli-Sendi A (2020) Dynamic firewall decomposition and composition in the cloud. IEEE Trans Inf Forensics Secur 15:3526–3539

    Google Scholar 

  21. Al-Shaer E, Hamed H (2004) Discovery of policy anomalies in distributed firewalls. IEEE INFOCOM ’04 4:2605–2616

    Google Scholar 

  22. Alfaro J, Boulahia-Cuppens N, Cuppens F (2008) Complete analysis of configuration rules to guarantee reliable network security policies. Int’l J Inf Secur 7(2):103–122

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Vijay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vijay, M., Devika, R., Priyangha, B.S. (2022). Anomaly Detection System and Resolution of Anomalies for Firewall Policies. In: Asokan, R., Ruiz, D.P., Baig, Z.A., Piramuthu, S. (eds) Smart Data Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-3311-0_12

Download citation

Publish with us

Policies and ethics