Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Abnormal Policy Detection and Correction Using Overlapping Transition

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Sunghyun-
dc.contributor.authorLee, Heejo-
dc.date.accessioned2021-09-08T03:34:29Z-
dc.date.available2021-09-08T03:34:29Z-
dc.date.created2021-06-11-
dc.date.issued2010-05-
dc.identifier.issn1745-1361-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/116555-
dc.description.abstractPolicy in security devices such as firewalls and Network Intrusion Prevention Systems (NIPS) is usually implemented as a sequence of rules. This allows network packets to proceed or to be discarded based on rule's decision. Since attack methods are increasing rapidly, a huge number of security rules are generated and maintained in security devices. Under attack or during heavy traffic, the policy configured wrong creates security holes and prevents the system from deciding quickly whether to allow or deny a packet. Anomalies between the rules occur when there is overlap among the rules. In this paper, we propose a new method to detect anomalies among rules and generate new rules without configuration error in multiple security devices as well as in a single security device. The proposed method cuts the overlap regions among rules into minimum overlap regions and finds the abnormal domain regions of rules' predicates. Classifying rules by the network traffic flow, the proposed method not only reduces computation overhead but blocks unnecessary traffic among distributed devices.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleAbnormal Policy Detection and Correction Using Overlapping Transition-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Heejo-
dc.identifier.doi10.1587/transinf.E93.D.1053-
dc.identifier.wosid000279136500013-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, no.5, pp.1053 - 1061-
dc.relation.isPartOfIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.titleIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.volumeE93D-
dc.citation.number5-
dc.citation.startPage1053-
dc.citation.endPage1061-
dc.type.rimsART-
dc.type.docTypeArticle; Proceedings Paper-
dc.description.journalClass1-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordAuthorfirewall-
dc.subject.keywordAuthorsecurity policy-
dc.subject.keywordAuthorpolicy anomalies-
dc.subject.keywordAuthornetwork security-
dc.subject.keywordAuthorACL-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hee jo photo

Lee, Hee jo
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE