Handling stateful firewall anomalies

Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz, Xavier Rimasson

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A security policy consists of a set of rules designed to protect an information system. To ensure this protection, the rules must be deployed on security components in a consistent and non-redundant manner. Unfortunately, an empirical approach is often adopted by network administrators, to the detriment of theoretical validation. While the literature on the analysis of configurations of first generation (stateless) firewalls is now rich, this is not the case for second and third generation firewalls, also known as stateful firewalls. In this paper, we address this limitation, and provide solutions to analyze and handle stateful firewall anomalies and misconfiguration.

Original languageEnglish
Title of host publicationInformation Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings
Pages174-186
Number of pages13
DOIs
Publication statusPublished - 23 Jul 2012
Externally publishedYes
Event27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012 - Heraklion, Crete, Greece
Duration: 4 Jun 20126 Jun 2012

Publication series

NameIFIP Advances in Information and Communication Technology
Volume376 AICT
ISSN (Print)1868-4238

Conference

Conference27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012
Country/TerritoryGreece
CityHeraklion, Crete
Period4/06/126/06/12

Fingerprint

Dive into the research topics of 'Handling stateful firewall anomalies'. Together they form a unique fingerprint.

Cite this