An Optimized Firewall Anomaly Resolution. Valenza, F. & Cheminod, M. Journal of Internet Services and Information Security, 10(1):22–37, 2020.
Paper doi abstract bibtex 9 downloads Firewalls are the key mechanism in cybersecurity, that has been widely used to ensure network security. In literature, several works have been proposed in the area of firewall rules managing, however, the correct firewall configuration still remains a complex and error-prone task. Anomalies among firewall rules can cause severe network breaches, such as allowing harmful packets to slip into a subnetwork or dropping legitimate traffic which in turn could hinder the correct availability of web services. This paper aims to help the network security administrators by introducing a formal approach that reduces the number of anomalies in firewalls’ configurations that the administrators are usually obligated to manually solve. © 2020, Innovative Information Science and Technology Research Group.
@Article{2020JISIS,
author = {Fulvio Valenza and Manuel Cheminod},
doi = {10.22667/JISIS.2020.02.29.022},
journal = {Journal of Internet Services and Information Security},
number = {1},
pages = {22--37},
title = {An Optimized Firewall Anomaly Resolution},
volume = {10},
year = {2020},
abstract={Firewalls are the key mechanism in cybersecurity, that has been widely used to ensure network security. In literature, several works have been proposed in the area of firewall rules managing, however, the correct firewall configuration still remains a complex and error-prone task. Anomalies among firewall rules can cause severe network breaches, such as allowing harmful packets to slip into a subnetwork or dropping legitimate traffic which in turn could hinder the correct availability of web services. This paper aims to help the network security administrators by introducing a formal approach that reduces the number of anomalies in firewalls’ configurations that the administrators are usually obligated to manually solve. © 2020, Innovative Information Science and Technology Research Group.},
url = {https://iris.polito.it/retrieve/handle/11583/2819872/356860/jisis-2020-vol10-no1-02.pdf},
keywords={Firewall, Anomaly Resolution},
}
Downloads: 9
{"_id":"9qbCyZPMLQ2yKWtHE","bibbaseid":"valenza-cheminod-anoptimizedfirewallanomalyresolution-2020","authorIDs":["anJrBcCdr4LzzWetx","x5vNTEJ4s3raTsibp"],"author_short":["Valenza, F.","Cheminod, M."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Fulvio"],"propositions":[],"lastnames":["Valenza"],"suffixes":[]},{"firstnames":["Manuel"],"propositions":[],"lastnames":["Cheminod"],"suffixes":[]}],"doi":"10.22667/JISIS.2020.02.29.022","journal":"Journal of Internet Services and Information Security","number":"1","pages":"22–37","title":"An Optimized Firewall Anomaly Resolution","volume":"10","year":"2020","abstract":"Firewalls are the key mechanism in cybersecurity, that has been widely used to ensure network security. In literature, several works have been proposed in the area of firewall rules managing, however, the correct firewall configuration still remains a complex and error-prone task. Anomalies among firewall rules can cause severe network breaches, such as allowing harmful packets to slip into a subnetwork or dropping legitimate traffic which in turn could hinder the correct availability of web services. This paper aims to help the network security administrators by introducing a formal approach that reduces the number of anomalies in firewalls’ configurations that the administrators are usually obligated to manually solve. © 2020, Innovative Information Science and Technology Research Group.","url":"https://iris.polito.it/retrieve/handle/11583/2819872/356860/jisis-2020-vol10-no1-02.pdf","keywords":"Firewall, Anomaly Resolution","bibtex":"@Article{2020JISIS,\r\n author = {Fulvio Valenza and Manuel Cheminod},\r\n doi = {10.22667/JISIS.2020.02.29.022},\r\n journal = {Journal of Internet Services and Information Security},\r\n number = {1},\r\n pages = {22--37},\r\n title = {An Optimized Firewall Anomaly Resolution},\r\n volume = {10},\r\n year = {2020},\r\n abstract={Firewalls are the key mechanism in cybersecurity, that has been widely used to ensure network security. In literature, several works have been proposed in the area of firewall rules managing, however, the correct firewall configuration still remains a complex and error-prone task. Anomalies among firewall rules can cause severe network breaches, such as allowing harmful packets to slip into a subnetwork or dropping legitimate traffic which in turn could hinder the correct availability of web services. This paper aims to help the network security administrators by introducing a formal approach that reduces the number of anomalies in firewalls’ configurations that the administrators are usually obligated to manually solve. © 2020, Innovative Information Science and Technology Research Group.},\r\n url = {https://iris.polito.it/retrieve/handle/11583/2819872/356860/jisis-2020-vol10-no1-02.pdf},\r\n keywords={Firewall, Anomaly Resolution},\r\n\r\n}\r\n\r\n\r\n\r\n\r\n\r\n","author_short":["Valenza, F.","Cheminod, M."],"key":"2020JISIS","id":"2020JISIS","bibbaseid":"valenza-cheminod-anoptimizedfirewallanomalyresolution-2020","role":"author","urls":{"Paper":"https://iris.polito.it/retrieve/handle/11583/2819872/356860/jisis-2020-vol10-no1-02.pdf"},"keyword":["Firewall","Anomaly Resolution"],"metadata":{"authorlinks":{"valenza, f":"https://bibbase.org/show?bib=https%3A%2F%2Fraw.githubusercontent.com%2FFulvioValenza%2Fbibliography%2Fmain%2FValenza_bibliography.bib&commas=true","valenza, f":"https://bibbase.org/service/mendeley/47be63fe-fca0-3f0f-a864-642602926c3f"}},"downloads":9},"bibtype":"article","biburl":"https://raw.githubusercontent.com/FulvioValenza/bibliography/main/Valenza_bibliography.bib","creationDate":"2021-01-16T10:07:49.735Z","downloads":9,"keywords":["firewall","anomaly resolution"],"search_terms":["optimized","firewall","anomaly","resolution","valenza","cheminod"],"title":"An Optimized Firewall Anomaly Resolution","year":2020,"dataSources":["JbiX35GNqPCF3nids","csYhy47rJJgSM7jjJ"]}