Copy the page URI to the clipboard
Bandara, A. K.; Kakas, A. C.; Lupu, E. C. and Russo, A.
(2009).
DOI: https://doi.org/10.1109/INM.2009.5188808
URL: http://cms.comsoc.org/eprise/main/SiteGen/IM_2009/...
Abstract
Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall configurations for errors, to verify that they correctly implement security requirements and to generate configurations from higher-level requirements. In this paper we extend our previous work on the use of formal argumentation and preference reasoning for firewall policy analysis and develop means to automatically generate firewall policies from higher-level requirements. This permits both analysis and generation to be done within the same framework, thus accommodating a wide variety of scenarios for authoring and maintaining firewall configurations. We validate our approach by applying it to both examples from the literature and real firewall configurations of moderate size (ap 150 rules).
Viewing alternatives
Metrics
Public Attention
Altmetrics from AltmetricNumber of Citations
Citations from DimensionsItem Actions
Export
About
- Item ORO ID
- 18484
- Item Type
- Conference or Workshop Item
- Keywords
- authorisation; corporate networks; firewall configuration management; firewall policy analysis; formal argumentation logic; formal logic; preference reasoning; security protection; software maintenance;
- Academic Unit or School
-
Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM) - Research Group
- Centre for Research in Computing (CRC)
- Depositing User
- Arosha Bandara