메뉴 건너뛰기




Volumn 51, Issue 4, 2007, Pages 1106-1120

Structured firewall design

Author keywords

Firewall; Firewall design; Firewall policy; Network security

Indexed keywords

COMPUTER SYSTEM FIREWALLS; DECISION THEORY; LOGIC PROGRAMMING; PACKET NETWORKS; PROBLEM SOLVING; SECURITY SYSTEMS;

EID: 33845688273     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2006.06.015     Document Type: Article
Times cited : (136)

References (25)
  • 1
    • 33845702245 scopus 로고    scopus 로고
    • High level firewall language. Available from: .
  • 2
    • 33845717161 scopus 로고    scopus 로고
    • ipchains. Available from: .
  • 3
    • 8344229907 scopus 로고    scopus 로고
    • E. Al-Shaer, H. Hamed, Discovery of policy anomalies in distributed firewalls, in: IEEE INFOCOM'04, 2004, pp. 2605-2616.
  • 5
    • 84904915613 scopus 로고    scopus 로고
    • F. Baboescu, G. Varghese, Fast and scalable conflict detection for packet classifiers, in: Proceedings of the 10th IEEE International Conference on Network Protocols, 2002.
  • 6
    • 84940102288 scopus 로고    scopus 로고
    • Y. Bartal, A.J. Mayer, K. Nissim, A. Wool, Firmato: a novel firewall management toolkit, in: Proceeding of the IEEE Symposium on Security and Privacy, 1999. pp. 17-31.
  • 7
    • 33845698147 scopus 로고    scopus 로고
    • A. Begel, S. McCanne, S.L. Graham, BPF+: exploiting global data-flow optimization in a generalized packet filter architecture, in: Proceedings of ACM SIGCOMM '99, 1999.
  • 8
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • Bryant R.E. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers 35 8 (1986) 677-691
    • (1986) IEEE Transactions on Computers , vol.35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 9
    • 33845689914 scopus 로고    scopus 로고
    • CERT, Test the firewall system. Available from: .
  • 10
    • 84945709727 scopus 로고
    • Goto statement considered harmful
    • Dijkstra E.W. Goto statement considered harmful. Communications of the ACM 11 3 (1968) 147-148
    • (1968) Communications of the ACM , vol.11 , Issue.3 , pp. 147-148
    • Dijkstra, E.W.1
  • 11
    • 65549164282 scopus 로고    scopus 로고
    • D. Eppstein, S. Muthukrishnan, Internet packet filter management and rectangle geometry, in: Symposium on Discrete Algorithms, 2001, pp. 827-835.
  • 12
    • 0038226197 scopus 로고    scopus 로고
    • A framework for understanding vulnerabilities in firewalls using a dataflow model of firewall internals
    • Frantzen M., Kerschbaum F., Schultz E., and Fahmy S. A framework for understanding vulnerabilities in firewalls using a dataflow model of firewall internals. Computers and Security 20 3 (2001) 263-270
    • (2001) Computers and Security , vol.20 , Issue.3 , pp. 263-270
    • Frantzen, M.1    Kerschbaum, F.2    Schultz, E.3    Fahmy, S.4
  • 13
    • 27544494353 scopus 로고    scopus 로고
    • M.G. Gouda, A.X. Liu, A model of stateful firewalls and its properties, in: Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN-05), 2005, pp. 320-327.
  • 14
    • 0035278163 scopus 로고    scopus 로고
    • Algorithms for packet classification
    • Gupta P., and McKeown N. Algorithms for packet classification. IEEE Network 15 2 (2001) 24-32
    • (2001) IEEE Network , vol.15 , Issue.2 , pp. 24-32
    • Gupta, P.1    McKeown, N.2
  • 15
    • 0030644427 scopus 로고    scopus 로고
    • J.D. Guttman, Filtering postures: local enforcement for global policies, in: Proceedings of IEEE Symposium on Security and Privacy, 1997, pp. 120-129.
  • 16
    • 0033885347 scopus 로고    scopus 로고
    • A. Hari, S. Suri, G.M. Parulkar, Detecting and resolving packet filter conflicts, in: Proceedings of IEEE INFOCOM, 2000, pp. 1203-1212.
  • 17
    • 0034590714 scopus 로고    scopus 로고
    • S. Hazelhurst, A. Attar, R. Sinnappan, Algorithms for improving the dependability of firewall and filter rule lists, in: Proceedings of the Workshop on Dependability of IP Applications, Platforms and Networks, 2000.
  • 20
    • 0033691924 scopus 로고    scopus 로고
    • A. Mayer, A. Wool, E. Ziskind, Fang: A firewall analysis engine, in: Proceedings of IEEE Symposium on Security and Privacy, 2000, pp. 177-187.
  • 21
    • 0012794098 scopus 로고
    • Policy conflict analysis in distributed system management
    • Moffett J.D., and Sloman M.S. Policy conflict analysis in distributed system management. Journal of Organizational Computing 4 1 (1994) 1-22
    • (1994) Journal of Organizational Computing , vol.4 , Issue.1 , pp. 1-22
    • Moffett, J.D.1    Sloman, M.S.2
  • 22
    • 33845200276 scopus 로고    scopus 로고
    • G. Patz, M. Condell, R. Krishnan, L. Sanchez, Multidimensional security policy management for dynamic coalitions, in: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX II), 2001.
  • 23
    • 33744584654 scopus 로고
    • Induction of decision trees
    • Quinlan J. Induction of decision trees. Machine Learning 1 1 (1986) 81-106
    • (1986) Machine Learning , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, J.1
  • 25
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • Wool A. A quantitative study of firewall configuration errors. IEEE Computer 37 6 (2004) 62-67
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 62-67
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.