A graph theoretic model for hardware-based firewalls

Y. Permpoontanalarp, Chaiwat Rujimethabhas
{"title":"A graph theoretic model for hardware-based firewalls","authors":"Y. Permpoontanalarp, Chaiwat Rujimethabhas","doi":"10.1109/ICON.2001.962345","DOIUrl":null,"url":null,"abstract":"Firewalls offer a protection for private networks against external attacks. However, configuring firewalls is a difficult task. The reason is that the effects of a firewall configuration cannot be easily seen during the configuration time. As a result, errors and loopholes in firewall configurations, if they exist, are discovered only after they actually happen at the execution time. We propose a preliminary yet novel model and its methodology for hardware-based firewalls. Our model offers precise and simple understanding of effects of firewall configurations. Moreover, our methodology offers an analysis of effects of firewall configurations. In particular, it provides reasoning about the correctness of firewall configurations. Also, the redundancy and inconsistency of firewall rules can be reasoned about. As a result, many kinds of errors and loopholes of firewall configurations can be detected during the configuration time.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICON.2001.962345","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Firewalls offer a protection for private networks against external attacks. However, configuring firewalls is a difficult task. The reason is that the effects of a firewall configuration cannot be easily seen during the configuration time. As a result, errors and loopholes in firewall configurations, if they exist, are discovered only after they actually happen at the execution time. We propose a preliminary yet novel model and its methodology for hardware-based firewalls. Our model offers precise and simple understanding of effects of firewall configurations. Moreover, our methodology offers an analysis of effects of firewall configurations. In particular, it provides reasoning about the correctness of firewall configurations. Also, the redundancy and inconsistency of firewall rules can be reasoned about. As a result, many kinds of errors and loopholes of firewall configurations can be detected during the configuration time.
硬件防火墙的图论模型
防火墙为私有网络提供防止外部攻击的保护。然而,配置防火墙是一项艰巨的任务。原因是防火墙配置的效果在配置期间不容易看到。因此,防火墙配置中的错误和漏洞(如果存在)只有在执行时实际发生之后才会被发现。我们提出了一个基于硬件的防火墙的初步而新颖的模型及其方法。我们的模型对防火墙配置的影响提供了精确而简单的理解。此外,我们的方法还提供了对防火墙配置影响的分析。特别是,它提供了关于防火墙配置正确性的推理。此外,还可以对防火墙规则的冗余性和不一致性进行推理。因此,在配置过程中可以检测到各种防火墙配置的错误和漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信