首页> 外文期刊>Computers & Security >Analysis of vulnerabilities in Internet firewalls
【24h】

Analysis of vulnerabilities in Internet firewalls

机译:分析Internet防火墙中的漏洞

获取原文
获取原文并翻译 | 示例
           

摘要

Firewalls protect a trusted network from an untrusted network by filtering traffic according to a specified security policy. A diverse set of firewalls is being used today. As it is infeasible to examine and test each firewall for all possible potential problems, a taxonomy is needed to understand firewall vulnerabilities in the context of firewall operations. This paper describes a novel methodology for analyzing vulnerabilities in Internet firewalls. A firewall vulnerability is defined as an error made during firewall design, implementation, or configuration, that can be exploited to attack the trusted network that the firewall is supposed to protect. We examine firewall internals, and cross-reference each firewall operation with causes and effects of weaknesses in that operation, analyzing twenty reported problems with available firewalls. The result of our analysis is a set of matrices that illustrate the distribution of firewall vulnerability causes and effects over firewall operations. These matrices are useful in avoiding and detecting unforeseen problems during both firewall implementation and firewall testing. Two case studies of Firewall-1 and Raptor illustrate our methodology.
机译:防火墙通过根据指定的安全策略过滤流量来保护受信任的网络与不受信任的网络。今天,正在使用各种各样的防火墙。由于检查和测试每个防火墙是否存在所有可能的潜在问题是不可行的,因此需要一种分类法来了解防火墙操作上下文中的防火墙漏洞。本文介绍了一种用于分析Internet防火墙中漏洞的新颖方法。防火墙漏洞被定义为在防火墙设计,实施或配置过程中发生的错误,可被利用来攻击防火墙应该保护的可信网络。我们检查了防火墙的内部结构,并将每个防火墙操作与该操作的弱点的原因和影响进行交叉引用,并分析了20个报告的可用防火墙问题。我们分析的结果是一组矩阵,这些矩阵说明了防火墙漏洞因果在防火墙操作上的分布。这些矩阵可用于在防火墙实施和防火墙测试期间避免和检测无法预料的问题。关于Firewall-1和Raptor的两个案例研究说明了我们的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号