A Matrix Model for Designing and Implementing Multi-firewall Environments
Abstract
Firewalls are core elements in network security, the effectiveness of firewall security is dependent on configuring the firewall policy correctly. A firewall policy describes the access that will be permitted or denied from the trusted network. In a corporate network several firewalls are setup and administrated by different individuals. The consistency between those firewall policies is crucial to corporate network security. However, the managing of these has become a complex and error-prone task. Bad configurations may cause serious security breaches and network vulnerabilities. In particular, conflicting filtering rules lead to block legitimate traffic or to accept unwanted packets. In this paper, we provide a firewall policy matrix for helping guide firewall administrators and designers overcome differences in interpreting firewall policies. The matrix presents how each firewall policy allows or denies traffic through the various firewalls in a distributive environment. The model was also tested in a university environment.
Keywords
References
- T. Abbes, A. Bouhoula and M. Rusinowitch, “An inference system for detecting firewall filtering rules anomalies”, SAC 08, Ceara, Brazil, pp. 2122-2128, 16-20 March 2008.
- J. G. Alfaro, N. Boulahia-Cuppens, F. Cuppens, “Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies”, International Journal of Information Security, Vol. 7, Issue 2, pp. 103-122, 2008.
- J. G. Alfaro, F. Cuppens and N. Cuppens- Boulahia, “Aggregating and deploying network access control policies”, ARES 07, Vienna, Austria, pp. 532-542, 10-13 April 2007.
- E. Al-Shaer, H. H. Hamed, “Modeling and Management Transactions
- Management, Vol. 1, No. 1, pp. 2-10, April 2004a. Network and
- Service [5] E. Al-Shaer and H. H. Hamed, “Discovery of policy anomalies in distributed firewalls”, IEEE Communications Society, Hong Kong, China, pp. 2605-2616 7-11 March 2004b.
- E. Al-Shaer, H. Hamed, R. Boutaba, M. Hasan, “Conflict
- Distributed Firewall Policies”, IEEE Journal on Communications, Vol. 23, No. 10, pp. 2069-2084, October 2005. and Analysis
Details
Primary Language
English
Subjects
-
Journal Section
-
Authors
Loye Ray
This is me
Publication Date
December 30, 2013
Submission Date
January 30, 2016
Acceptance Date
-
Published in Issue
Year 2013 Volume: 2 Number: 4