F. Bezzazi, A. Kartit, M. E. Marraki, D. Aboutajdine
{"title":"Optimized strategy of deployment firewall policies","authors":"F. Bezzazi, A. Kartit, M. E. Marraki, D. Aboutajdine","doi":"10.1109/INTECH.2012.6457775","DOIUrl":null,"url":null,"abstract":"Modern networks are becoming larger and more complex. This requires administrators and management tools to update their security policies and improve the deployment of their firewall. This latter represents a challenging and error-prone task, which aims to pass from one policy to another one while respecting the conditions of safety and security. Several studies have focused on the conception, optimization of security policy and conflict detection but rare are the researchers who tried to improve the firewall policy deployment. In this paper, we investigated the algorithm of type II policy and showed its vulnerability in some cases. As alternative, we provide a new algorithm for publishing political class type II. Further to its safety, our algorithm can be used even for the deployment of important size policies.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INTECH.2012.6457775","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Modern networks are becoming larger and more complex. This requires administrators and management tools to update their security policies and improve the deployment of their firewall. This latter represents a challenging and error-prone task, which aims to pass from one policy to another one while respecting the conditions of safety and security. Several studies have focused on the conception, optimization of security policy and conflict detection but rare are the researchers who tried to improve the firewall policy deployment. In this paper, we investigated the algorithm of type II policy and showed its vulnerability in some cases. As alternative, we provide a new algorithm for publishing political class type II. Further to its safety, our algorithm can be used even for the deployment of important size policies.