Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies


Autoria(s): García Alfaro, Joaquín; Cuppens, Nora; Cuppens, Frederic
Contribuinte(s)

K-ryptography and Information Security for Open Networks. KISON

Resumo

Peer-reviewed

The use of different network security components, such as firewalls and network intrusion detectionsystems (NIDSs), is the dominant method to monitorand guarantee the security policy in current corporate networks. To properly configure these components, it is necessary to use several sets of security rules. Nevertheless, the existence of anomalies between those rules, particularly in distributed multi-component scenarios, is very likely to degrade the network security policy. Thediscovery and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a complete set of mechanisms for such a management.

Identificador

http://hdl.handle.net/10609/1319

Idioma(s)

eng

Direitos

The original publication is available at: <a href="http://link.springer.com/article/10.1007/s10207-007-0045-7">http://link.springer.com/article/10.1007/s10207-007-0045-7</a>

Fonte

http://hdl.handle.net/10363/608

Palavras-Chave #Internet -- Security measures #Computer networks -- Security measures #Firewalls (Computer security) #Computer security #Internet -- Mesures de seguretat #Ordinadors, Xarxes d' -- Mesures de seguretat #Tallafocs (Seguretat informàtica) #Informàtica -- Mesures de seguretat #Internet -- Medidas de seguridad #Ordenadores, Redes de -- Medidas de seguridad #Cortafuegos (Seguridad informática) #Informática -- Medidas de seguridad
Tipo

Article