Practical firewall policy inspection using anomaly detection and its visualization

Ui Hyong Kim, Jung Min Kang, Jae Sung Lee, Hyong Shik Kim, Soon Young Jung

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations' rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts.

Original languageEnglish
Pages (from-to)627-641
Number of pages15
JournalMultimedia Tools and Applications
Volume71
Issue number2
DOIs
Publication statusPublished - 2014 Jul

Keywords

  • Anomaly
  • FPA
  • FPC
  • Firewall
  • Policy
  • Visualization

ASJC Scopus subject areas

  • Software
  • Media Technology
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Practical firewall policy inspection using anomaly detection and its visualization'. Together they form a unique fingerprint.

Cite this