Misconfiguration in Firewalls and Network Access Controls: Literature Review

被引:8
作者
Alicea, Michael [1 ]
Alsmadi, Izzat [1 ]
机构
[1] Texas A&M Univ, Dept Comp & Cyber Secur, San Antonio, TX 78224 USA
关键词
network firewalls; network access controls; firewall roles misconfiguration; RULES; DISCOVERY; ANOMALIES; MECHANISM;
D O I
10.3390/fi13110283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles' misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.
引用
收藏
页数:15
相关论文
共 64 条
[11]   Complete analysis of configuration rules to guarantee reliable network security policies [J].
Alfaro, J. G. ;
Boulahia-Cuppens, N. ;
Cuppens, F. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) :103-122
[12]  
Alicea M., 2021, MISCONFIGURATIONS NE
[13]  
Arthur J.K., 2019, INT J COMPUT APPL, V975, P8887
[14]   A parallel approach for detecting OpenFlow rule anomalies based on a general formalism [J].
Aryan, Ramtin ;
Yazidi, Anis ;
Kure, Oivind ;
Einar Engelstad, Paal .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (15)
[15]  
Aryan R, 2018, C LOCAL COMPUT NETW, P502, DOI 10.1109/LCN.2018.8638226
[16]   A General Formalism for Defining and Detecting OpenFlow Rule Anomalies [J].
Aryan, Ramtin ;
Yazidi, Anis ;
Engelstad, Paal Einar ;
Kure, Oivind .
2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, :426-434
[17]   Using argumentation logic for firewall policy specification and analysis [J].
Bandara, Arosha K. ;
Kakas, Antonis ;
Lupu, Emil C. ;
Russo, Alessandra .
LARGE SCALE MANAGEMENT OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, 4269 :185-196
[18]   Analysis of Application-Layer Filtering Policies With Application to HTTP [J].
Basile, Cataldo ;
Lioy, Antonio .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2015, 23 (01) :28-41
[19]  
Baumeister J, 2006, LECT NOTES ARTIF INT, V4248, P82
[20]  
Brand Murray., 2007, A Comprehensive Firewall Testing Methodology