A Matrix Model for Designing and Implementing Multi-firewall Environments

Volume: 2 Number: 4 December 30, 2013
  • Loye Ray
EN

A Matrix Model for Designing and Implementing Multi-firewall Environments

Abstract

Firewalls are core elements in network security, the effectiveness of firewall security is dependent on configuring the firewall policy correctly. A firewall policy describes the access that will be permitted or denied from the trusted network. In a corporate network several firewalls are setup and administrated by different individuals. The consistency between those firewall policies is crucial to corporate network security. However, the managing of these has become a complex and error-prone task. Bad configurations may cause serious security breaches and network vulnerabilities. In particular, conflicting filtering rules lead to block legitimate traffic or to accept unwanted packets. In this paper, we provide a firewall policy matrix for helping guide firewall administrators and designers overcome differences in interpreting firewall policies. The matrix presents how each firewall policy allows or denies traffic through the various firewalls in a distributive environment. The model was also tested in a university environment.

Keywords

References

  1. T. Abbes, A. Bouhoula and M. Rusinowitch, “An inference system for detecting firewall filtering rules anomalies”, SAC 08, Ceara, Brazil, pp. 2122-2128, 16-20 March 2008.
  2. J. G. Alfaro, N. Boulahia-Cuppens, F. Cuppens, “Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies”, International Journal of Information Security, Vol. 7, Issue 2, pp. 103-122, 2008.
  3. J. G. Alfaro, F. Cuppens and N. Cuppens- Boulahia, “Aggregating and deploying network access control policies”, ARES 07, Vienna, Austria, pp. 532-542, 10-13 April 2007.
  4. E. Al-Shaer, H. H. Hamed, “Modeling and Management Transactions
  5. Management, Vol. 1, No. 1, pp. 2-10, April 2004a. Network and
  6. Service [5] E. Al-Shaer and H. H. Hamed, “Discovery of policy anomalies in distributed firewalls”, IEEE Communications Society, Hong Kong, China, pp. 2605-2616 7-11 March 2004b.
  7. E. Al-Shaer, H. Hamed, R. Boutaba, M. Hasan, “Conflict
  8. Distributed Firewall Policies”, IEEE Journal on Communications, Vol. 23, No. 10, pp. 2069-2084, October 2005. and Analysis

Details

Primary Language

English

Subjects

-

Journal Section

-

Authors

Loye Ray This is me

Publication Date

December 30, 2013

Submission Date

January 30, 2016

Acceptance Date

-

Published in Issue

Year 2013 Volume: 2 Number: 4

APA
Ray, L. (2013). A Matrix Model for Designing and Implementing Multi-firewall Environments. International Journal of Information Security Science, 2(4), 119-128. https://izlik.org/JA95AG97RM
AMA
1.Ray L. A Matrix Model for Designing and Implementing Multi-firewall Environments. IJISS. 2013;2(4):119-128. https://izlik.org/JA95AG97RM
Chicago
Ray, Loye. 2013. “A Matrix Model for Designing and Implementing Multi-Firewall Environments”. International Journal of Information Security Science 2 (4): 119-28. https://izlik.org/JA95AG97RM.
EndNote
Ray L (December 1, 2013) A Matrix Model for Designing and Implementing Multi-firewall Environments. International Journal of Information Security Science 2 4 119–128.
IEEE
[1]L. Ray, “A Matrix Model for Designing and Implementing Multi-firewall Environments”, IJISS, vol. 2, no. 4, pp. 119–128, Dec. 2013, [Online]. Available: https://izlik.org/JA95AG97RM
ISNAD
Ray, Loye. “A Matrix Model for Designing and Implementing Multi-Firewall Environments”. International Journal of Information Security Science 2/4 (December 1, 2013): 119-128. https://izlik.org/JA95AG97RM.
JAMA
1.Ray L. A Matrix Model for Designing and Implementing Multi-firewall Environments. IJISS. 2013;2:119–128.
MLA
Ray, Loye. “A Matrix Model for Designing and Implementing Multi-Firewall Environments”. International Journal of Information Security Science, vol. 2, no. 4, Dec. 2013, pp. 119-28, https://izlik.org/JA95AG97RM.
Vancouver
1.Loye Ray. A Matrix Model for Designing and Implementing Multi-firewall Environments. IJISS [Internet]. 2013 Dec. 1;2(4):119-28. Available from: https://izlik.org/JA95AG97RM