Fireasy: a tool to aid security policy modeling, translation and understanding firewall configuration

Leandro Meira Marinho Queiroz, Rogerio Eduardo Garcia, D. M. Eler, Ronaldo Celso Messias Correia
{"title":"Fireasy: a tool to aid security policy modeling, translation and understanding firewall configuration","authors":"Leandro Meira Marinho Queiroz, Rogerio Eduardo Garcia, D. M. Eler, Ronaldo Celso Messias Correia","doi":"10.23919/cisti54924.2022.9820578","DOIUrl":null,"url":null,"abstract":"Companies store increasing amounts of data, requiring the implementation of mechanisms to protect them from malicious people. There are techniques and procedures that aim to increase the security of computer systems, such as network protection services, firewalls. They are intended to filter packets that enter and leave a network. Its settings depend on security policies, which consist of documents that describe what is allowed to travel on the network and what is prohibited. The transcription of security policies into rules, written in native firewall language, that represent them, is the main source of errors in firewall configurations. In this work, concepts related to security between networks and firewalls are presented. Related works on security policies and their translations into firewall rules are also referenced. Furthermore, the developed tool, named Fireasy, is presented, which allows the modeling of security policies through graphic elements, and the maintenance of rules written in native firewall language, also representing them in graphic elements. Finally, a controlled experiment was conducted to validate the approach, which indicated, in addition to the correct functioning of the tool, an improvement in the translation of security policies into firewall rules using the tool. In the task of understanding firewall rules, there was a homogenization of the participants' performance when they used the tool.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/cisti54924.2022.9820578","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Companies store increasing amounts of data, requiring the implementation of mechanisms to protect them from malicious people. There are techniques and procedures that aim to increase the security of computer systems, such as network protection services, firewalls. They are intended to filter packets that enter and leave a network. Its settings depend on security policies, which consist of documents that describe what is allowed to travel on the network and what is prohibited. The transcription of security policies into rules, written in native firewall language, that represent them, is the main source of errors in firewall configurations. In this work, concepts related to security between networks and firewalls are presented. Related works on security policies and their translations into firewall rules are also referenced. Furthermore, the developed tool, named Fireasy, is presented, which allows the modeling of security policies through graphic elements, and the maintenance of rules written in native firewall language, also representing them in graphic elements. Finally, a controlled experiment was conducted to validate the approach, which indicated, in addition to the correct functioning of the tool, an improvement in the translation of security policies into firewall rules using the tool. In the task of understanding firewall rules, there was a homogenization of the participants' performance when they used the tool.
Fireasy:一个帮助安全策略建模、转换和理解防火墙配置的工具
公司存储越来越多的数据,需要实现保护它们免受恶意人员攻击的机制。有一些技术和程序旨在提高计算机系统的安全性,例如网络保护服务、防火墙。它们用于过滤进入和离开网络的数据包。它的设置取决于安全策略,这些策略由描述哪些内容可以在网络上传播、哪些内容被禁止的文件组成。将安全策略转录成规则(用本机防火墙语言编写并表示它们)是防火墙配置错误的主要来源。在这项工作中,介绍了与网络和防火墙之间的安全相关的概念。本文还参考了安全策略及其转换为防火墙规则的相关工作。此外,还介绍了开发的Fireasy工具,该工具允许通过图形元素对安全策略进行建模,并维护用本地防火墙语言编写的规则,也可以在图形元素中表示它们。最后,进行了一个对照实验来验证该方法,该实验表明,除了工具的正确功能之外,使用该工具将安全策略转换为防火墙规则方面也有改进。在理解防火墙规则的任务中,当参与者使用该工具时,他们的表现存在同质化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信