Analysis of policy anomalies on distributed network security setups

J. G. Alfaro, F. Cuppens, N. Cuppens-Boulahia

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to survey and guarantee the security policy in current corporate networks. On the one hand, firewalls are traditional security components which provide means to filter traffic within corporate networks, as well as to police the incoming and outcoming interaction with the Internet. On the other hand, NIDSs are complementary security components used to enhance the visibility level of the network, pointing to malicious or anomalous traffic. To properly configure both firewalls and NIDSs, it is necessary to use several sets of filtering and alerting rules. Nevertheless, the existence of anomalies between those rules, particularly in distributed multi-component scenarios, is very likely to degrade the network security policy. The discovering and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a set of algorithms for such a management.

Original languageEnglish
Title of host publicationComputer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings
PublisherSpringer Verlag
Pages496-511
Number of pages16
ISBN (Print)354044601X, 9783540446019
DOIs
Publication statusPublished - 1 Jan 2006
Externally publishedYes
Event11th European Symposium on Research in Computer Security, ESORICS 2006 - Hamburg, Germany
Duration: 18 Sept 200620 Sept 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4189 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th European Symposium on Research in Computer Security, ESORICS 2006
Country/TerritoryGermany
CityHamburg
Period18/09/0620/09/06

Fingerprint

Dive into the research topics of 'Analysis of policy anomalies on distributed network security setups'. Together they form a unique fingerprint.

Cite this