【24h】

IPsec/Firewall Security Policy Analysis: A Survey

机译:IPsec /防火墙安全策略分析:调查

获取原文
获取原文并翻译 | 示例

摘要

As the technology reliance increases, computer networks are getting bigger and larger and so are threats and attacks. Therefore Network security becomes a major concern during this last decade. Network Security requires a combination of hardware devices and software applications. Namely, Firewalls and IPsec gateways are two technologies that provide network security protection and repose on security policies which are maintained to ensure traffic control and network safety. Nevertheless, security policy misconfigurations and inconsistency between the policy's rules produce errors and conflicts, which are often very hard to detect and consequently cause security holes and compromise the entire system functionality. In This paper, we review the related approaches which have been proposed for security policy management along with surveying the literature for conflicts detection and resolution techniques. This work highlights the advantages and limitations of the proposed solutions for security policy verification in IPsec and Firewalls and gives an overall comparison and classification of the existing approaches.
机译:随着技术依赖性的提高,计算机网络越来越大,威胁和攻击也越来越大。因此,在过去的十年中,网络安全成为主要问题。网络安全需要硬件设备和软件应用程序的组合。即,防火墙和IPsec网关是两项技术,它们提供网络安全保护并依赖于维护的安全策略,以确保流量控制和网络安全。但是,安全策略的错误配置和策略规则之间的不一致会产生错误和冲突,这些错误和冲突通常很难检测,因此会导致安全漏洞并损害整个系统功能。在本文中,我们回顾了已提出的有关安全策略管理的相关方法,并调查了有关冲突检测和解决技术的文献。这项工作突出了建议的IPsec和防火墙安全策略验证解决方案的优点和局限性,并对现有方法进行了总体比较和分类。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号