首页>
外国专利>
Removing anomalies from security policies of a network security device
Removing anomalies from security policies of a network security device
展开▼
机译:从网络安全设备的安全策略中删除异常
展开▼
页面导航
摘要
著录项
相似文献
摘要
The techniques described herein may optimize a set of ordered rules of a security device through the removal of one or more anomalies. For example, a security management system or other configuration management system or component may detect and remove one or more anomalies from a set (e.g., list) of one or more ordered rules to be enforced by the network security device, such as shadowing anomalies, redundancy anomalies, and/or correlation anomalies, among others, as described herein. Security management system may transform the set of ordered rules to replace at least a subset of the rules within one or more mutually exclusive rules. In some instances, the security management system may optimize the transformed rule set, for example, by using redundancy removal and/or join/merge policies.
展开▼