Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Sunghyun-
dc.contributor.authorLee, Heejo-
dc.date.accessioned2021-09-08T00:48:04Z-
dc.date.available2021-09-08T00:48:04Z-
dc.date.created2021-06-14-
dc.date.issued2010-08-27-
dc.identifier.issn1976-7277-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/115858-
dc.description.abstractThe continuous growth of attacks in the Internet causes to generate a number of rules in security devices such as Intrusion Prevention Systems, firewalls, etc. Policy anomalies in security devices create security holes and prevent the system from determining quickly whether allow or deny a packet. Policy anomalies exist among the rules in multiple security devices as well as in a single security device. The solution for policy anomalies requires complex and complicated algorithms. In this paper, we propose a new method to remove policy anomalies in a single security device and avoid policy anomalies among the rules in distributed security devices. The proposed method classifies rules according to traffic direction and checks policy anomalies in each device. It is unnecessary to compare the rules for outgoing traffic with the rules for incoming traffic. Therefore, classifying rules by in-out traffic, the proposed method can reduce the number of rules to be compared up to a half. Instead of detecting policy anomalies in distributed security devices, one adopts the rules from others for avoiding anomaly. After removing policy anomalies in each device, other firewalls can keep the policy consistency without anomalies by adopting the rules of a trusted firewall. In addition, it blocks unnecessary traffic because a source side sends as much traffic as the destination side accepts. Also we explain another policy anomaly which can be found under a connection-oriented communication protocol.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherKSII-KOR SOC INTERNET INFORMATION-
dc.subjectFIREWALL-
dc.subjectCLASSIFICATION-
dc.titleClassifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Heejo-
dc.identifier.doi10.3837/tiis.2010.08.013-
dc.identifier.scopusid2-s2.0-77956979737-
dc.identifier.wosid000282525200013-
dc.identifier.bibliographicCitationKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.4, no.4, pp.671 - 690-
dc.relation.isPartOfKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.titleKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.volume4-
dc.citation.number4-
dc.citation.startPage671-
dc.citation.endPage690-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART001476866-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.description.journalRegisteredClassother-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusFIREWALL-
dc.subject.keywordPlusCLASSIFICATION-
dc.subject.keywordAuthorFirewall-
dc.subject.keywordAuthorsecurity policy-
dc.subject.keywordAuthorpolicy anomalies-
dc.subject.keywordAuthornetwork security-
dc.subject.keywordAuthorACL-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hee jo photo

Lee, Hee jo
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE