A new approach to deploy a self-adaptive distributed firewall

被引:3
作者
da Costa Junior, Edmilson P. [1 ]
da Silva, Carlos Eduardo [1 ]
Pinheiro, Marcos [2 ]
Sampaio, Silvio [1 ]
机构
[1] Fed Univ Rio Grande do Norte UFRN, Digital Metropolis Inst, Natal, RN, Brazil
[2] Fed Univ Rio Grande do Norte UFRN, Dept Informat & Appl Math, Natal, RN, Brazil
关键词
Distributed firewall; Self-adaptive software; Network security; Software vulnerability assessment;
D O I
10.1186/s13174-018-0083-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed firewall systems emerged with the proposal of protecting individual hosts against attacks originating from inside the network. In these systems, firewall rules are centrally created, then distributed and enforced on all servers that compose the firewall, restricting which services will be available. However, this approach lacks protection against software vulnerabilities that can make network services vulnerable to attacks, since firewalls usually do not scan application protocols. In this sense, from the discovery of any vulnerability until the publication and application of patches there is an exposure window that should be reduced. In this context, this article presents Self-Adaptive Distributed Firewall (SADF). Our approach is based on monitoring hosts and using a vulnerability assessment system to detect vulnerable services, integrated with components capable of deciding and applying firewall rules on affected hosts In this way, SADF can respond to vulnerabilities discovered in these hosts, helping to mitigate the risk of exploiting the vulnerability. Our system was evaluated in the context of a simulated network environment, where the results achieved demonstrate its viability.
引用
收藏
页数:21
相关论文
共 34 条
[1]  
Al-Shaer E., 2014, SPECIFICATION REFINE, P49, DOI [10.1007/978-3-319-10371-6_3, DOI 10.1007/978-3-319-10371-6_3]
[2]  
Alferes JJ, 2006, EVENT CONDITION ACTI, P29, DOI [10.1007/11853886_5, DOI 10.1007/11853886_5]
[3]   Security of Software Defined Networks: A survey [J].
Alsmadr, Izzat ;
Xu, Dianxiang .
COMPUTERS & SECURITY, 2015, 53 :79-108
[4]   Self-adaptive federated authorization infrastructures [J].
Bailey, Christopher ;
Chadwick, David W. ;
de Lemos, Rogerio .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (05) :935-952
[5]  
Bellovin Steven M., 1999, J LOGIN, P39
[6]  
Cha S, 2016, INT CONF CONTR AUTO, P1, DOI 10.1109/ICCAIS.2016.7822425
[7]   PERMIS: a modular authorization infrastructure [J].
Chadwick, David ;
Zhao, Gansen ;
Otenko, Sassa ;
Laborde, Romain ;
Su, Linying ;
Nguyen, Tuan Anh .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2008, 20 (11) :1341-1357
[8]   Software Engineering for Self-Adaptive Systems: A Research Roadmap [J].
Cheng, Betty H. C. ;
de Lemos, Rogerio ;
Giese, Holger ;
Inverardi, Paola ;
Magee, Jeff ;
Andersson, Jesper ;
Becker, Basil ;
Bencomo, Nelly ;
Brun, Yuriy ;
Cukic, Bojan ;
Serugendo, Giovanna Di Marzo ;
Dustdar, Schahram ;
Finkelstein, Anthony ;
Gacek, Cristina ;
Geihs, Kurt ;
Grassi, Vincenzo ;
Karsai, Gabor ;
Kienle, Holger M. ;
Kramer, Jeff ;
Litoiu, Marin ;
Malek, Sam ;
Mirandola, Raffaela ;
Mueller, Hausi A. ;
Park, Sooyong ;
Shaw, Mary ;
Tichy, Matthias ;
Tivoli, Massimo ;
Weyns, Danny ;
Whittle, Jon .
SOFTWARE ENGINEERING FOR SELF-ADAPTIVE SYSTEMS, 2009, 5525 :1-+
[9]  
da Costa Jr EP, 2016, 16 S BRAS SEG INF SI
[10]   Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store [J].
Daniel, Joshua ;
Dimitrakos, Theo ;
El-Moussa, Fadi ;
Ducatel, Gery ;
Pawar, Pramod ;
Sajjad, Ali .
2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, :1021-1026