Bandara, A. K.; Kakas, A. C.; Lupu, E. C. and Russo, A.
|DOI (Digital Object Identifier) Link:||https://doi.org/10.1109/INM.2009.5188808|
|Google Scholar:||Look up in Google Scholar|
Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall configurations for errors, to verify that they correctly implement security requirements and to generate configurations from higher-level requirements. In this paper we extend our previous work on the use of formal argumentation and preference reasoning for firewall policy analysis and develop means to automatically generate firewall policies from higher-level requirements. This permits both analysis and generation to be done within the same framework, thus accommodating a wide variety of scenarios for authoring and maintaining firewall configurations. We validate our approach by applying it to both examples from the literature and real firewall configurations of moderate size (ap 150 rules).
|Item Type:||Conference Item|
|Keywords:||authorisation; corporate networks; firewall configuration management; firewall policy analysis; formal argumentation logic; formal logic; preference reasoning; security protection; software maintenance;|
|Academic Unit/School:||Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM)
|Interdisciplinary Research Centre:||Centre for Policing Research and Learning (CPRL)
Centre for Research in Computing (CRC)
International Development & Inclusive Innovation
|Depositing User:||Arosha Bandara|
|Date Deposited:||23 Sep 2009 15:35|
|Last Modified:||09 Feb 2017 12:36|
|Share this page:|