International Journal of Communication Networks and Security IJCNS

ISSN: 2231-1882

Conference
ijcct journal

Abstracting and Indexing

Crossref logo
IIMT Bhubaneswar

IJCNS

“FAME”: FSPYING & SOLVING FIREWALL ANOMALIES


B LAKSHIMIBHARGAVI
MITS, MADANAPALLE ,A.P,India

V MARUTI PRASAD
MITS, MADANAPALLE ,A.P,India


Abstract

Advent of many emerging computing technologies became very catchy to users. So, usage of technology increasing very rapidly day by day. Security became major issue. People who are working through the internet suffer from unintended security leakages by unauthorised actions in an organization and also problems created by hackers through the malicious codes. To overcome the security issues we have a concept called “firewall” .Network fire alls guard an internal computer network (home, school, business intranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. In this paper, we elaborate FAME(firewall anomaly management environment) and we will have a glance on firewall anomalies and resolving techniques. In addition we are going explain few concepts practically and also representing diagrammatically

Recommended Citation

[1] IEEE transactions on dependable and secure computing, vol. 9, no. 3, may/june 2012. “Detecting and Resolving Firewall Policy Anomalies”. [2] E. Al-Shaer and H. Hamed, “Discovery of Policy Anomalies in Distributed Firewalls,” IEEE INFOCOM ’04, vol. 4, pp. 2605-2616, 2004. [3] A. Wool, “Trends in Firewall Configuration Errors: Measurin the Holes in Swiss Cheese,” IEEE Internet Computing, vol. 14, no. 4, pp. 58-65, July/Aug. 2010. [4] J. Alfaro, N. Boulahia-Cuppens, and F. Cuppens, “Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies,” Int’l J. Information Security, vol. 7, no. 2, pp. 103- 122, 2008. [5] F. Baboescu and G. Varghese, “Fast and Scalable Conflict Detection for Packet Classifiers,” Computer Networks, vol. 42, no. 6, pp. 717-735, 2003. [6] L. Yuan, H. Chen, J. Mai, C. Chuah, Z. Su, P. Mohapatra, and C. Davis, “Fireman: A Toolkit for Firewall Modeling and Analysis,” Proc. IEEE Symp. Security and Privacy, p. 15, 2006. 

Download pdf viewer for your browser, if the PDF cannot be displayed.