Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Practical firewall policy inspection using anomaly detection and its visualization

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Ui-Hyong-
dc.contributor.authorKang, Jung-Min-
dc.contributor.authorLee, Jae-Sung-
dc.contributor.authorKim, Hyong-Shik-
dc.contributor.authorJung, Soon-Young-
dc.date.accessioned2021-09-05T07:18:42Z-
dc.date.available2021-09-05T07:18:42Z-
dc.date.created2021-06-15-
dc.date.issued2014-07-
dc.identifier.issn1380-7501-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/98062-
dc.description.abstractDue to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations' rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titlePractical firewall policy inspection using anomaly detection and its visualization-
dc.typeArticle-
dc.contributor.affiliatedAuthorJung, Soon-Young-
dc.identifier.doi10.1007/s11042-013-1673-8-
dc.identifier.scopusid2-s2.0-84903817464-
dc.identifier.wosid000338317400015-
dc.identifier.bibliographicCitationMULTIMEDIA TOOLS AND APPLICATIONS, v.71, no.2, pp.627 - 641-
dc.relation.isPartOfMULTIMEDIA TOOLS AND APPLICATIONS-
dc.citation.titleMULTIMEDIA TOOLS AND APPLICATIONS-
dc.citation.volume71-
dc.citation.number2-
dc.citation.startPage627-
dc.citation.endPage641-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthorFirewall-
dc.subject.keywordAuthorPolicy-
dc.subject.keywordAuthorAnomaly-
dc.subject.keywordAuthorVisualization-
dc.subject.keywordAuthorFPA-
dc.subject.keywordAuthorFPC-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jung, Soon Young photo

Jung, Soon Young
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE