Practical firewall policy inspection using anomaly detection and its visualization
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Ui-Hyong | - |
dc.contributor.author | Kang, Jung-Min | - |
dc.contributor.author | Lee, Jae-Sung | - |
dc.contributor.author | Kim, Hyong-Shik | - |
dc.contributor.author | Jung, Soon-Young | - |
dc.date.accessioned | 2021-09-05T07:18:42Z | - |
dc.date.available | 2021-09-05T07:18:42Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2014-07 | - |
dc.identifier.issn | 1380-7501 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/98062 | - |
dc.description.abstract | Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations' rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | Practical firewall policy inspection using anomaly detection and its visualization | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jung, Soon-Young | - |
dc.identifier.doi | 10.1007/s11042-013-1673-8 | - |
dc.identifier.scopusid | 2-s2.0-84903817464 | - |
dc.identifier.wosid | 000338317400015 | - |
dc.identifier.bibliographicCitation | MULTIMEDIA TOOLS AND APPLICATIONS, v.71, no.2, pp.627 - 641 | - |
dc.relation.isPartOf | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.title | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.volume | 71 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 627 | - |
dc.citation.endPage | 641 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | Firewall | - |
dc.subject.keywordAuthor | Policy | - |
dc.subject.keywordAuthor | Anomaly | - |
dc.subject.keywordAuthor | Visualization | - |
dc.subject.keywordAuthor | FPA | - |
dc.subject.keywordAuthor | FPC | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.