Automation for network security configuration: state of the art and research trends

D Bringhenti, G Marchetto, R Sisto… - ACM Computing Surveys, 2023 - dl.acm.org
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …

MulVAL: A logic-based network security analyzer.

X Ou, S Govindavajhala, AW Appel - USENIX security symposium, 2005 - usenix.org
To determine the security impact software vulnerabilities have on a particular network, one
must consider interactions among multiple network elements. For a vulnerability analysis …

Fireman: A toolkit for firewall modeling and analysis

L Yuan, H Chen, J Mai, CN Chuah, Z Su… - … IEEE Symposium on …, 2006 - ieeexplore.ieee.org
Security concerns are becoming increasingly critical in networked systems. Firewalls
provide important defense for network security. However, misconfigurations in firewalls are …

Multilayer firewall system

DM Nessett, WP Sherer - US Patent 5,968,176, 1999 - Google Patents
57 ABSTRACT A System provides for establishing Security in a network that include nodes
having Security functions operating in mul tiple protocol layers. Multiple network devices …

Discovery of policy anomalies in distributed firewalls

ES Al-Shaer, HH Hamed - Ieee Infocom 2004, 2004 - ieeexplore.ieee.org
Firewalls are core elements in network security. However, managing firewall rules,
particularly in multi-firewall enterprise networks, has become a complex and error-prone …

Practical declarative network management

TL Hinrichs, NS Gude, M Casado, JC Mitchell… - Proceedings of the 1st …, 2009 - dl.acm.org
We present Flow-based Management Language (FML), a declarative policy language for
managing the configuration of enterprise networks. FML was designed to replace the many …

Firewall policy advisor for anomaly discovery and rule editing

ES Al-Shaer, HH Hamed - … network management VIII: Managing it all, 2003 - Springer
Firewalls are core elements in network security. However, managing firewall rules,
especially for enterprize networks, has become complex and error-prone. Firewall filtering …

Firmato A novel firewall management toolkit

Y Bartal, A Mayer, K Nissim, A Wool - ACM Transactions on Computer …, 2004 - dl.acm.org
In recent years packet-filtering firewalls have seen some impressive technological advances
(eg, stateful inspection, transparency, performance, etc.) and wide-spread deployment. In …

Automated firewall configuration in virtual networks

D Bringhenti, G Marchetto, R Sisto… - … on Dependable and …, 2022 - ieeexplore.ieee.org
The configuration of security functions in computer networks is still typically performed
manually, which likely leads to security breaches and long re-configuration times. This …

Conflict classification and analysis of distributed firewall policies

E Al-Shaer, H Hamed, R Boutaba… - IEEE journal on …, 2005 - ieeexplore.ieee.org
Firewalls are core elements in network security. However, managing firewall rules,
particularly, in multifirewall enterprise networks, has become a complex and error-prone …