首页> 外文期刊>Journal of Visual Languages & Computing >A novel three-tiered visualization approach for firewall rule validation
【24h】

A novel three-tiered visualization approach for firewall rule validation

机译:一种新颖的三层可视化方法,用于防火墙规则验证

获取原文
获取原文并翻译 | 示例
       

摘要

Firewall is one of the most critical elements of the current Internet, which can protect the entire network against attacks and threats. While configuring the firewalls, rule configuration has to conform to, or say be consistent with, the demands of the network security policies such that the network security would not be flawed. For the security consistency, firewall rule editing, ordering, and distribution must be done very carefully on each of the cooperative firewalls, especially in a large-scale and multifirewall-equipped network. Nevertheless, a network operator is prone to incorrectly configure the firewalls because there are typically thousands or hundreds of filtering/admission rules (i.e., rules in the Access Control List file, or ACL for short), which could be set up in a firewall; not mentioning these rules among firewalls affect mutually and can make the matter worse. Under this situation, the network operator would hardly know his/her misconfiguration until the network functions beyond the expectation. For this reason, our work is to build a visualized validation system for facilitating the check of security consistency between the rule configuration of firewalls and the demands of network security policies. To do so, the developed validation system utilizes a three-tiered visualization hierarchy along with different compound viewpoints to provide users with a complete picture of firewalls and relationships among them for error debugging and anomaly removal. In addition, in this paper, we also enumerate the source of security inconsistency while setting ACLs and make use of it as a basis of the design of our visualization model. Currently, part of the firewall configuration of our campus network has been used as our system's input to demonstrate our system's implementation.
机译:防火墙是当前Internet的最关键元素之一,它可以保护整个网络免受攻击和威胁。在配置防火墙时,规则配置必须符合或符合网络安全策略的要求,以使网络安全不会受到影响。为了确保安全性,必须非常仔细地在每个协作防火墙上进行防火墙规则的编辑,排序和分发,尤其是在具有大型多防火墙功能的网络中。但是,网络运营商很容易错误地配置防火墙,因为通常有数千或数百个过滤/允许规则(即访问控制列表文件中的规则,简称ACL)可以在防火墙中设置;在防火墙之间不提及这些规则会相互影响,并使情况变得更糟。在这种情况下,网络运营商几乎不会知道他/她的配置错误,直到网络运行超出预期。因此,我们的工作是建立一个可视化的验证系统,以方便检查防火墙的规则配置和网络安全策略的需求之间的安全一致性。为此,开发的验证系统利用三层可视化层次结构以及不同的复合视点,为用户提供完整的防火墙图片以及防火墙之间的关系,以进行错误调试和异常清除。此外,在本文中,我们还列举了设置ACL时安全性不一致的根源,并将其用作设计可视化模型的基础。当前,校园网络的部分防火墙配置已用作系统输入,以演示系统的实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号