Systematic Literature Review on Usability of Firewall Configuration

被引:17
作者
Voronkov, Artem [1 ]
Iwaya, Leonardo Horn [1 ]
Martucci, Leonardo A. [1 ]
Lindskog, Stefan [1 ]
机构
[1] Karlstad Univ, Karlstad, Sweden
关键词
Firewall; usability; visualization; systematic literature review; INFORMATION; DISCOVERY; SECURITY;
D O I
10.1145/3130876
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Firewalls are network security components that handle incoming and outgoing network traffic based on a set of rules. The process of correctly configuring a firewall is complicated and prone to error, and it worsens as the network complexity grows. A poorly configured firewall may result in major security threats; in the case of a network firewall, an organization's security could be endangered, and in the case of a personal firewall, an individual computer's security is threatened. A major reason for poorly configured firewalls, as pointed out in the literature, is usability issues. Our aim is to identify existing solutions that help professional and non-professional users to create and manage firewall configuration files, and to analyze the proposals in respect of usability. A systematic literature review with a focus on the usability of firewall configuration is presented in the article. Its main goal is to explore what has already been done in this field. In the primary selection procedure, 1,202 articles were retrieved and then screened. The secondary selection led us to 35 articles carefully chosen for further investigation, of which 14 articles were selected and summarized. As main contributions, we propose a taxonomy of existing solutions as well as a synthesis and in-depth discussion about the state of the art in firewall usability. Among the main findings, we perceived that there is a lack (or even an absence) of usability evaluation or user studies to validate the proposed models. Although all articles are related to the topic of usability, none of them clearly defines it, and only a few actually employ usability design principles and/or guidelines.
引用
收藏
页数:35
相关论文
共 79 条
  • [1] Abdullah K, 2005, IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, P1
  • [2] Conflict classification and analysis of distributed firewall policies
    Al-Shaer, E
    Hamed, H
    Boutaba, R
    Hasan, M
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (10) : 2069 - 2084
  • [3] Al-Shaer ES, 2004, IEEE INFOCOM SER, P2605
  • [4] Firewall policy advisor for anomaly discovery and rule editing
    Al-Shaer, ES
    Hamed, HH
    [J]. INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 17 - 30
  • [5] Complete analysis of configuration rules to guarantee reliable network security policies
    Alfaro, J. G.
    Boulahia-Cuppens, N.
    Cuppens, F.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 103 - 122
  • [6] Alfayyadh B., 2010, 2010 IEEE International Conference on Information Theory and Information Security, P682, DOI 10.1109/ICITIS.2010.5689490
  • [7] [Anonymous], 2009, TECHNICAL REPORT
  • [8] [Anonymous], 1993, Usability Engineering
  • [9] [Anonymous], P LISA
  • [10] [Anonymous], 924111 ISO, DOI DOI 10.1007/978-3-319-20901-213