A new approach to deploy a self-adaptive distributed firewall

被引:3
作者
da Costa Junior, Edmilson P. [1 ]
da Silva, Carlos Eduardo [1 ]
Pinheiro, Marcos [2 ]
Sampaio, Silvio [1 ]
机构
[1] Fed Univ Rio Grande do Norte UFRN, Digital Metropolis Inst, Natal, RN, Brazil
[2] Fed Univ Rio Grande do Norte UFRN, Dept Informat & Appl Math, Natal, RN, Brazil
关键词
Distributed firewall; Self-adaptive software; Network security; Software vulnerability assessment;
D O I
10.1186/s13174-018-0083-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed firewall systems emerged with the proposal of protecting individual hosts against attacks originating from inside the network. In these systems, firewall rules are centrally created, then distributed and enforced on all servers that compose the firewall, restricting which services will be available. However, this approach lacks protection against software vulnerabilities that can make network services vulnerable to attacks, since firewalls usually do not scan application protocols. In this sense, from the discovery of any vulnerability until the publication and application of patches there is an exposure window that should be reduced. In this context, this article presents Self-Adaptive Distributed Firewall (SADF). Our approach is based on monitoring hosts and using a vulnerability assessment system to detect vulnerable services, integrated with components capable of deciding and applying firewall rules on affected hosts In this way, SADF can respond to vulnerabilities discovered in these hosts, helping to mitigate the risk of exploiting the vulnerability. Our system was evaluated in the context of a simulated network environment, where the results achieved demonstrate its viability.
引用
收藏
页数:21
相关论文
共 34 条
[11]   MAPE-K Formal Templates to Rigorously Design Behaviors for Self-Adaptive Systems [J].
de la Iglesia, Didac Gil ;
Weyns, Danny .
ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2015, 10 (03)
[12]   Enabling automated threat response through the use of a dynamic security policy [J].
Debar, Herve ;
Thomas, Yohann ;
Cuppens, Frederic ;
Cuppens-Boulahia, Nora .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (03) :195-210
[13]  
DMTF, 2016, NETW POL MAN PROF
[14]  
dos Santos LAF, 2016, S BRASILEIRO REDES C, P600
[15]   A Probabilistic Approach to Autonomic Security Management [J].
Iannucci, Stefano ;
Abdelwahed, Sherif .
2016 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC), 2016, :157-166
[16]  
Ioannidis S., 2000, P ACM C COMPUTER COM, P190
[17]   The vision of autonomic computing [J].
Kephart, JO ;
Chess, DM .
COMPUTER, 2003, 36 (01) :41-+
[18]  
Kurose J.F., 2012, COMPUTER NETWORKING, Vsixth
[19]   Design and Implementation of Distributed Firewall System for IPv6 [J].
Lai, Yingxu ;
Jiang, Guangzhi ;
Li, Jian ;
Yang, Zhen .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, :428-432
[20]   Collaborative Security: A Survey and Taxonomy [J].
Meng, Guozhu ;
Liu, Yang ;
Zhang, Jie ;
Pokluda, Alexander ;
Boutaba, Raouf .
ACM COMPUTING SURVEYS, 2015, 48 (01)