Complete analysis of configuration rules to guarantee reliable network security policies

Research output: Contribution to journalArticlepeer-review

Abstract

The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the security policy in current corporate networks. To properly configure these components, it is necessary to use several sets of security rules. Nevertheless, the existence of anomalies between those rules, particularly in distributed multi-component scenarios, is very likely to degrade the network security policy. The discovery and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a complete set of mechanisms for such a management.

Original languageEnglish
Pages (from-to)103-122
Number of pages20
JournalInternational Journal of Information Security
Volume7
Issue number2
DOIs
Publication statusPublished - 1 Apr 2008
Externally publishedYes

Keywords

  • Firewalls
  • Intrusion detection systems
  • Network security
  • Policy anomalies

Fingerprint

Dive into the research topics of 'Complete analysis of configuration rules to guarantee reliable network security policies'. Together they form a unique fingerprint.

Cite this