Skip to main content

Towards Filtering and Alerting Rule Rewriting on Single-Component Policies

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2006)

Abstract

The use of firewalls and network intrusion detection systems (NIDSs) is the dominant method to survey and guarantee the security policy in current corporate networks. On the one hand, firewalls are traditional security components which provide means to filter traffic within corporate networks, as well as to police the incoming and outcoming interaction with the Internet. On the other hand, NIDSs are complementary security components used to enhance the visibility level of the network, pointing to malicious or anomalous traffic. To properly configure both firewalls and NIDSs, it is necessary the use of a set of configuration rules, i.e., a set of filtering or alerting rules. Nevertheless, the existence of anomalies within the set of configuration rules of both firewalls and NIDSs is very likely to degrade the network security policy. The discovering and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a set of mechanisms for such a management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adiseshu, H., Suri, S., Parulkar, G.: Detecting and Resolving Packet Filter Conflicts. In: 19th Annual Joint Conference of the IEEE Computer and Communications Societies (2000)

    Google Scholar 

  2. Al-Shaer, E.S., Hamed, H.H., Masum, H.: Conflict Classification and Analysis of Distributed Firewall Policie. IEEE Journal on Selected Areas in Communications 1(1) (2005)

    Google Scholar 

  3. Castagnetto, J., et al.: Professional PHP Programming (1999)

    Google Scholar 

  4. Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miege, A.: Second Workshop on Formal Aspects in Security and Trust. A formal approach to specify and deploy a network security policy. In: Second Workshop on Formal Aspects in Security and Trust, pp. 203–218 (2004)

    Google Scholar 

  5. Cuppens, F., Cuppens-Boulahia, N., García-Alfaro, J.: Detection and Removal of Firewall Misconfiguration. In: 2005 International Conference on Communication, Network and Information Security, pp. 154–162 (2005)

    Google Scholar 

  6. Gupta, P.: Algorithms for Routing Lookups and Packet Classification. Ph.D Thesis, Department of Computer Science, Stanford University (2000)

    Google Scholar 

  7. Liu, A.X., Gouda, M.G.: Complete Redundancy Detection in Firewalls. In: Jajodia, S., Wijesekera, D. (eds.) Data and Applications Security 2005. LNCS, vol. 3654, pp. 193–206. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. MITRE Corp. Common Vulnerabilities and Exposures [Online], Available from: http://cve.mitre.org/

  9. Northcutt, S.: Network Intrusion Detection: An analyst’s Hand Book, 3rd edn. New Riders Publishing (2002)

    Google Scholar 

  10. Open Security Foundation. Open Source Vulnerability Database [Online], Available from: http://osvdb.org/

  11. Paul, O., Laurent, M., Gombault, S.: A full bandwidth ATM Firewall. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  12. Roesch, M.: Snort: lightweight intrusion detection for networks. In: 13th USENIX Systems Administration Conference, Seattle, WA (1999)

    Google Scholar 

  13. Welte, H., Kadlecsik, J., Josefsson, M., McHardy, P., et al.: The netfilter project: firewalling, nat and packet mangling for linux 2.4x and 2.6.x [Online], Available from: http://www.netfilter.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

García-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N. (2006). Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. In: Górski, J. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2006. Lecture Notes in Computer Science, vol 4166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11875567_14

Download citation

  • DOI: https://doi.org/10.1007/11875567_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45762-6

  • Online ISBN: 978-3-540-45763-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics