Misconfiguration in Firewalls and Network Access Controls: Literature Review

被引:8
作者
Alicea, Michael [1 ]
Alsmadi, Izzat [1 ]
机构
[1] Texas A&M Univ, Dept Comp & Cyber Secur, San Antonio, TX 78224 USA
关键词
network firewalls; network access controls; firewall roles misconfiguration; RULES; DISCOVERY; ANOMALIES; MECHANISM;
D O I
10.3390/fi13110283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles' misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.
引用
收藏
页数:15
相关论文
共 64 条
[1]   Analysis of firewall policy rules using traffic mining techniques [J].
Abedin, Muhammad ;
Nessa, Syeda ;
Khan, Latifur ;
Al-Shaer, Ehab ;
Awad, Mamoun .
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2010, 5 (1-2) :3-22
[2]  
Ahmed Z., 2018, INT J COMPUT INTELL, V2, P6
[3]  
Ahn G.J., 2015, ASSURED RESOURCE SHA
[4]  
Akiki M., 2009, THESIS CONCORDIA U M
[5]   Conflict classification and analysis of distributed firewall policies [J].
Al-Shaer, E ;
Hamed, H ;
Boutaba, R ;
Hasan, M .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (10) :2069-2084
[6]  
Al-Shaer E., P 3 ACM WORKSH ASS U, P37
[7]  
Al-shaer E.S., 2002, Design and implementation of firewall policy advisor tools
[8]  
Al-Shaer Ehab S., 2004, IEEE Transactions on Network and Service Management, V1, P2, DOI [DOI 10.1109/TNSM.2004.4623689, 10.1109/TNSM.2004.4623689]
[9]  
Al-Shaer ES, 2004, IEEE INFOCOM SER, P2605
[10]   Firewall policy advisor for anomaly discovery and rule editing [J].
Al-Shaer, ES ;
Hamed, HH .
INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 :17-30