Firewall policy change-impact analysis

Author:

Liu Alex X.1

Affiliation:

1. Michigan State University, East Lansing, MI

Abstract

Firewalls are the cornerstones of the security infrastructure for most enterprises. They have been widely deployed for protecting private networks. The quality of the protection provided by a firewall directly depends on the quality of its policy (i.e., configuration). Due to the lack of tools for analyzing firewall policies, many firewalls used today have policy errors. A firewall policy error either creates security holes that will allow malicious traffic to sneak into a private network or blocks legitimate traffic and disrupts normal business processes, which in turn could lead to irreparable, if not tragic, consequences. A major cause of policy errors are policy changes. Firewall policies often need to be changed as networks evolve and new threats emerge. Users behind a firewall often request the firewall administrator to modify rules to allow or protect the operation of some services. In this article, we first present the theory and algorithms for firewall policy change-impact analysis. Our algorithms take as input a firewall policy and a proposed change, then output the accurate impact of the change. Thus, a firewall administrator can verify a proposed change before committing it. We implemented our firewall change-impact analysis algorithms, and tested them on both real-life and synthetic firewall policies. The experimental results show that our algorithms are effective in terms of ensuring firewall policy correctness and efficient in terms of computing the impact of policy changes. Thus, our tool can be practically used in the iterative process of firewall policy design and maintenance. Although the focus of this article is on firewalls, the change-impact analysis algorithms proposed in this article are not limited to firewalls. Rather, they can be applied to other rule-based systems, such as router access control lists (ACLs), as well.

Funder

Division of Computer and Network Systems

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications

Reference48 articles.

1. Baboescu F. Singh S. and Varghese G. 2003. Packet classification for core routers: Is there an alternative to CAMs? In Proceedings of the Annual Joint Conference of the IEEE Computer and Communication Societies (InfoCom). Baboescu F. Singh S. and Varghese G. 2003. Packet classification for core routers: Is there an alternative to CAMs? In Proceedings of the Annual Joint Conference of the IEEE Computer and Communication Societies (InfoCom).

2. Bohner S. and Arnold R. 1996. An introduction to software change impact analysis. In Software Change Impact Analysis S. Bohner and R. Arnold Eds. IEEE Computer Society Press 1--26. Bohner S. and Arnold R. 1996. An introduction to software change impact analysis. In Software Change Impact Analysis S. Bohner and R. Arnold Eds. IEEE Computer Society Press 1--26.

Cited by 11 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Anomaly detection of policies in distributed firewalls using data log analysis;The Journal of Supercomputing;2023-05-29

2. A Firewall Policy Anomaly Detection Framework for Reliable Network Security;IEEE Transactions on Reliability;2021

3. Methods and Tools for Policy Analysis;ACM Computing Surveys;2019-11-30

4. Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach;The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology;2017-08-15

5. Fast and Complete Conflict Detection for Packet Classifiers;IEEE Systems Journal;2017-06

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3