Skip to main content

A Novel and Feasible System for Rule Anomaly and Behavior Mismatching Diagnosis Among Firewalls

  • Conference paper
  • First Online:
Intelligent Technologies and Engineering Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 234))

Abstract

While configuring firewalls, firewall rule ordering and distribution must be done cautiously on each of cooperative firewalls, especially in a large-scale network. However, network operators are prone to incorrectly configuring firewalls because there are typically hundreds of thousands of filtering rules (i.e., rules in the access control list file, or ACL for short) which could be set up in a firewall, not to mention these rules among firewalls could affect mutually. To speed up the crucial but laboring inspection of rule configuration on firewalls, this chapter describes our developed diagnosis system which can not only figure out anomalies among firewall rules effectively but also infer/correlate the main reasons from the diagnosed anomalies for filtering (behavior) mismatching between firewalls. At the end of this chapter, the system prototype is shown as a demonstration of our system implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hari B, Suri S, Parulkar G (2000) Detecting and resolving packet filter conflicts. Proc IEEE INFOCOM 3:1203–1212

    Google Scholar 

  2. Al-Shaer E, Hamed H (2004) Discovery of policy anomalies in distributed firewalls. In: Proceedings of the 23rd annual joint conference of the IEEE Computer and Communications Societies, vol 4, pp 2605–2616

    Google Scholar 

  3. Al-Shaer E, Hamed H (2003) Firewall policy advisor for anomaly discovery and rule editing, In: Proceedings of the 8th international symposium on integrated network management, pp 17–30

    Google Scholar 

  4. Al-Shaer E, Hamed H, Boutaba R, Hasan M (2005) Conflict classification and analysis of distributed firewall policies. IEEE J Selected Areas Commun 23(10):2069–2084

    Article  Google Scholar 

  5. Al-Shaer E (2004) Managing firewall and network-edge security policies. In: Proceedings of network operations and management symposium, vol 1, pp 926–932

    Google Scholar 

  6. Yin Y, Katayama Y, Takahashi N (2008) Detection of conflicts caused by a combinations of filters based on spatial relationships. J Inf Process Soc Jpn 49:3121–3135

    Google Scholar 

  7. Thanasegaran S, Yin Y, Tateiwa Y, Katayama Y, Takahashi N (2009) Topological approach to detect conflicts in firewall policies. In: International workshop on security in systems and networks, proceedings of the of 23rd IEEE international parallel and distributed processing symposium, SSN-1569173665-paper-3.pdf

    Google Scholar 

  8. Yin Y, Bhuvaneswaran RS, Katayama Y, Takahashi N (2005) Implementation of packet filter configurations anomaly detection system with SIERRA. In: International conference on information, communication and signal processing, LNCS 3783, pp 467–480

    Google Scholar 

  9. Chao CS, Liu AC (2006) An internet firewall policy verification system. In: Proceedings of the 9th Asia-Pacific network operations and management symposium, Poster session 1, No. 4, Sept 2006

    Google Scholar 

  10. Chao CS (2007) An internet firewall policy validation system. In: Proceedings of the 10th Asia-Pacific network operations and management symposium, Oct 2007, pp 364–374

    Google Scholar 

  11. Liu A, Gouda MG (2008) Diverse firewall design. IEEE Trans Parallel Distrib Syst 19(9):1237–1251

    Article  Google Scholar 

  12. Liu A (2009) Firewall policy verification and troubleshooting. Comput Netw 53(16):2800–2809

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi-Shih Chao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Chao, CS. (2013). A Novel and Feasible System for Rule Anomaly and Behavior Mismatching Diagnosis Among Firewalls. In: Juang, J., Huang, YC. (eds) Intelligent Technologies and Engineering Systems. Lecture Notes in Electrical Engineering, vol 234. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6747-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6747-2_7

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6746-5

  • Online ISBN: 978-1-4614-6747-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics