Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Hyunjung-
dc.contributor.authorLee, Suryeon-
dc.contributor.authorKim, Kyounggon-
dc.contributor.authorKim, Huy Kang-
dc.date.accessioned2021-12-07T17:42:23Z-
dc.date.available2021-12-07T17:42:23Z-
dc.date.created2021-08-30-
dc.date.issued2021-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/130139-
dc.description.abstractMost of the companies have firewalls in order to protect their internal networks and assets from the attacker of the cyber space. Firewall policies should be maintained and organized with high importance. However, considering the length of time needed in analyzing the highly complex policies and the risks of disabling firewall that may arise in case of a false policy setting. It is extremely hard to securely optimize the performance of firewalls. This paper is to suggest a visualization tool that shows the status and the types of policies applied throughout the firewalls so that such difficulties related to the maintenance of firewall policies can be resolved. The proposed tool is designed in six different angles; (1) Hierarchy-view, (2) Anomaly-view, (3) Distributed-view, (4) ANYPolicy-view, (5) SearchResult-view, and (6) Top and Bottom Used-view. The core of the overall function is to facilitate the easy identification of the policy interrelationships. The visualization tool has been tested by being applied across approximately 24 different firewall policies. The processing speed of each function and abuse detection rate were all reviewed positively. By the help of the tool, identifying the services, performance improvement, and visibility of the policy relations, which thereby will lead to better safety in preserving the assets intact. A video of the proposed visualization tool can be found on the web site: https://youtu.be/43OfHN8dteU-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleHSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Huy Kang-
dc.identifier.doi10.1109/ACCESS.2021.3077146-
dc.identifier.scopusid2-s2.0-85105891486-
dc.identifier.wosid000652049700001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.9, pp.71737 - 71753-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume9-
dc.citation.startPage71737-
dc.citation.endPage71753-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorData visualization-
dc.subject.keywordAuthorFirewalls (computing)-
dc.subject.keywordAuthorVisualization-
dc.subject.keywordAuthorTools-
dc.subject.keywordAuthorComplexity theory-
dc.subject.keywordAuthorLicenses-
dc.subject.keywordAuthorIP networks-
dc.subject.keywordAuthorFirewall policy visualization-
dc.subject.keywordAuthorpolicy analysis-
dc.subject.keywordAuthordata visualization-
dc.subject.keywordAuthorrule anomaly detection-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE