Handling stateful firewall anomalies

23Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A security policy consists of a set of rules designed to protect an information system. To ensure this protection, the rules must be deployed on security components in a consistent and non-redundant manner. Unfortunately, an empirical approach is often adopted by network administrators, to the detriment of theoretical validation. While the literature on the analysis of configurations of first generation (stateless) firewalls is now rich, this is not the case for second and third generation firewalls, also known as stateful firewalls. In this paper, we address this limitation, and provide solutions to analyze and handle stateful firewall anomalies and misconfiguration. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J., Moataz, T., & Rimasson, X. (2012). Handling stateful firewall anomalies. In IFIP Advances in Information and Communication Technology (Vol. 376 AICT, pp. 174–186). https://doi.org/10.1007/978-3-642-30436-1_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free