Loading...
Please wait, while we are loading the content...
Similar Documents
1 Firewall Anomaly Management: A survey
| Content Provider | CiteSeerX |
|---|---|
| Author | Hanamsagar, Ameya Jane, Ninad Borate, Bhagyashree Wasv, Aditi Darade, S. A. |
| Abstract | Firewall secures a private network from intrusions from other networks. The firewall has ACLs (Access Control List) that contain rules used to allow or deny incoming traffic. These rules form the security policy of the firewall. The large size and complexity of modern networks result in large and complex firewall policies. Designing policies for a network of firewalls is a difficult task as a number of cases have to be taken into consideration for access control. Also, a network administrator may want to update the policies in order to replace them with new ones. The process of updating firewall policies is difficult and error prone. In this paper, we provide a structured and comprehensive overview of various techniques in regards to firewall anomaly detection. We briefly describe and compare various known algorithms and tools used to detect and/or resolve the firewall anomalies. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Firewall Anomaly Management Network Administrator New One Private Network Incoming Traffic Anomaly Detection Firewall Anomaly Various Technique Firewall Policy Large Size Error Prone Access Control Modern Network Comprehensive Overview Access Control List Complex Firewall Policy Difficult Task |
| Content Type | Text |