Automation for network security configuration: state of the art and research trends
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …
consequence of novel architectural paradigms such as the Internet of Things and network …
MulVAL: A logic-based network security analyzer.
To determine the security impact software vulnerabilities have on a particular network, one
must consider interactions among multiple network elements. For a vulnerability analysis …
must consider interactions among multiple network elements. For a vulnerability analysis …
Fireman: A toolkit for firewall modeling and analysis
Security concerns are becoming increasingly critical in networked systems. Firewalls
provide important defense for network security. However, misconfigurations in firewalls are …
provide important defense for network security. However, misconfigurations in firewalls are …
Multilayer firewall system
DM Nessett, WP Sherer - US Patent 5,968,176, 1999 - Google Patents
57 ABSTRACT A System provides for establishing Security in a network that include nodes
having Security functions operating in mul tiple protocol layers. Multiple network devices …
having Security functions operating in mul tiple protocol layers. Multiple network devices …
Discovery of policy anomalies in distributed firewalls
ES Al-Shaer, HH Hamed - Ieee Infocom 2004, 2004 - ieeexplore.ieee.org
Firewalls are core elements in network security. However, managing firewall rules,
particularly in multi-firewall enterprise networks, has become a complex and error-prone …
particularly in multi-firewall enterprise networks, has become a complex and error-prone …
Practical declarative network management
TL Hinrichs, NS Gude, M Casado, JC Mitchell… - Proceedings of the 1st …, 2009 - dl.acm.org
We present Flow-based Management Language (FML), a declarative policy language for
managing the configuration of enterprise networks. FML was designed to replace the many …
managing the configuration of enterprise networks. FML was designed to replace the many …
Firewall policy advisor for anomaly discovery and rule editing
ES Al-Shaer, HH Hamed - … network management VIII: Managing it all, 2003 - Springer
Firewalls are core elements in network security. However, managing firewall rules,
especially for enterprize networks, has become complex and error-prone. Firewall filtering …
especially for enterprize networks, has become complex and error-prone. Firewall filtering …
Firmato A novel firewall management toolkit
In recent years packet-filtering firewalls have seen some impressive technological advances
(eg, stateful inspection, transparency, performance, etc.) and wide-spread deployment. In …
(eg, stateful inspection, transparency, performance, etc.) and wide-spread deployment. In …
Automated firewall configuration in virtual networks
The configuration of security functions in computer networks is still typically performed
manually, which likely leads to security breaches and long re-configuration times. This …
manually, which likely leads to security breaches and long re-configuration times. This …
Conflict classification and analysis of distributed firewall policies
E Al-Shaer, H Hamed, R Boutaba… - IEEE journal on …, 2005 - ieeexplore.ieee.org
Firewalls are core elements in network security. However, managing firewall rules,
particularly, in multifirewall enterprise networks, has become a complex and error-prone …
particularly, in multifirewall enterprise networks, has become a complex and error-prone …