Practical firewall policy inspection using anomaly detection and its visualization
Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable...
Ausführliche Beschreibung
Autor*in: |
Kim, Ui-Hyong [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2013 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media New York 2013 |
---|
Übergeordnetes Werk: |
Enthalten in: Multimedia tools and applications - Springer US, 1995, 71(2013), 2 vom: 22. Aug., Seite 627-641 |
---|---|
Übergeordnetes Werk: |
volume:71 ; year:2013 ; number:2 ; day:22 ; month:08 ; pages:627-641 |
Links: |
---|
DOI / URN: |
10.1007/s11042-013-1673-8 |
---|
Katalog-ID: |
OLC2035011027 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2035011027 | ||
003 | DE-627 | ||
005 | 20230503192653.0 | ||
007 | tu | ||
008 | 200819s2013 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11042-013-1673-8 |2 doi | |
035 | |a (DE-627)OLC2035011027 | ||
035 | |a (DE-He213)s11042-013-1673-8-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 070 |a 004 |q VZ |
100 | 1 | |a Kim, Ui-Hyong |e verfasserin |4 aut | |
245 | 1 | 0 | |a Practical firewall policy inspection using anomaly detection and its visualization |
264 | 1 | |c 2013 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media New York 2013 | ||
520 | |a Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. | ||
650 | 4 | |a Firewall | |
650 | 4 | |a Policy | |
650 | 4 | |a Anomaly | |
650 | 4 | |a Visualization | |
650 | 4 | |a FPA | |
650 | 4 | |a FPC | |
700 | 1 | |a Kang, Jung-Min |4 aut | |
700 | 1 | |a Lee, Jae-Sung |4 aut | |
700 | 1 | |a Kim, Hyong-Shik |4 aut | |
700 | 1 | |a Jung, Soon-Young |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Multimedia tools and applications |d Springer US, 1995 |g 71(2013), 2 vom: 22. Aug., Seite 627-641 |w (DE-627)189064145 |w (DE-600)1287642-2 |w (DE-576)052842126 |x 1380-7501 |7 nnns |
773 | 1 | 8 | |g volume:71 |g year:2013 |g number:2 |g day:22 |g month:08 |g pages:627-641 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11042-013-1673-8 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OLC-MKW | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 71 |j 2013 |e 2 |b 22 |c 08 |h 627-641 |
author_variant |
u h k uhk j m k jmk j s l jsl h s k hsk s y j syj |
---|---|
matchkey_str |
article:13807501:2013----::rciafrwlplcisetouignmldtcin |
hierarchy_sort_str |
2013 |
publishDate |
2013 |
allfields |
10.1007/s11042-013-1673-8 doi (DE-627)OLC2035011027 (DE-He213)s11042-013-1673-8-p DE-627 ger DE-627 rakwb eng 070 004 VZ Kim, Ui-Hyong verfasserin aut Practical firewall policy inspection using anomaly detection and its visualization 2013 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2013 Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. Firewall Policy Anomaly Visualization FPA FPC Kang, Jung-Min aut Lee, Jae-Sung aut Kim, Hyong-Shik aut Jung, Soon-Young aut Enthalten in Multimedia tools and applications Springer US, 1995 71(2013), 2 vom: 22. Aug., Seite 627-641 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:71 year:2013 number:2 day:22 month:08 pages:627-641 https://doi.org/10.1007/s11042-013-1673-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 71 2013 2 22 08 627-641 |
spelling |
10.1007/s11042-013-1673-8 doi (DE-627)OLC2035011027 (DE-He213)s11042-013-1673-8-p DE-627 ger DE-627 rakwb eng 070 004 VZ Kim, Ui-Hyong verfasserin aut Practical firewall policy inspection using anomaly detection and its visualization 2013 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2013 Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. Firewall Policy Anomaly Visualization FPA FPC Kang, Jung-Min aut Lee, Jae-Sung aut Kim, Hyong-Shik aut Jung, Soon-Young aut Enthalten in Multimedia tools and applications Springer US, 1995 71(2013), 2 vom: 22. Aug., Seite 627-641 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:71 year:2013 number:2 day:22 month:08 pages:627-641 https://doi.org/10.1007/s11042-013-1673-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 71 2013 2 22 08 627-641 |
allfields_unstemmed |
10.1007/s11042-013-1673-8 doi (DE-627)OLC2035011027 (DE-He213)s11042-013-1673-8-p DE-627 ger DE-627 rakwb eng 070 004 VZ Kim, Ui-Hyong verfasserin aut Practical firewall policy inspection using anomaly detection and its visualization 2013 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2013 Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. Firewall Policy Anomaly Visualization FPA FPC Kang, Jung-Min aut Lee, Jae-Sung aut Kim, Hyong-Shik aut Jung, Soon-Young aut Enthalten in Multimedia tools and applications Springer US, 1995 71(2013), 2 vom: 22. Aug., Seite 627-641 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:71 year:2013 number:2 day:22 month:08 pages:627-641 https://doi.org/10.1007/s11042-013-1673-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 71 2013 2 22 08 627-641 |
allfieldsGer |
10.1007/s11042-013-1673-8 doi (DE-627)OLC2035011027 (DE-He213)s11042-013-1673-8-p DE-627 ger DE-627 rakwb eng 070 004 VZ Kim, Ui-Hyong verfasserin aut Practical firewall policy inspection using anomaly detection and its visualization 2013 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2013 Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. Firewall Policy Anomaly Visualization FPA FPC Kang, Jung-Min aut Lee, Jae-Sung aut Kim, Hyong-Shik aut Jung, Soon-Young aut Enthalten in Multimedia tools and applications Springer US, 1995 71(2013), 2 vom: 22. Aug., Seite 627-641 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:71 year:2013 number:2 day:22 month:08 pages:627-641 https://doi.org/10.1007/s11042-013-1673-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 71 2013 2 22 08 627-641 |
allfieldsSound |
10.1007/s11042-013-1673-8 doi (DE-627)OLC2035011027 (DE-He213)s11042-013-1673-8-p DE-627 ger DE-627 rakwb eng 070 004 VZ Kim, Ui-Hyong verfasserin aut Practical firewall policy inspection using anomaly detection and its visualization 2013 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2013 Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. Firewall Policy Anomaly Visualization FPA FPC Kang, Jung-Min aut Lee, Jae-Sung aut Kim, Hyong-Shik aut Jung, Soon-Young aut Enthalten in Multimedia tools and applications Springer US, 1995 71(2013), 2 vom: 22. Aug., Seite 627-641 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:71 year:2013 number:2 day:22 month:08 pages:627-641 https://doi.org/10.1007/s11042-013-1673-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 71 2013 2 22 08 627-641 |
language |
English |
source |
Enthalten in Multimedia tools and applications 71(2013), 2 vom: 22. Aug., Seite 627-641 volume:71 year:2013 number:2 day:22 month:08 pages:627-641 |
sourceStr |
Enthalten in Multimedia tools and applications 71(2013), 2 vom: 22. Aug., Seite 627-641 volume:71 year:2013 number:2 day:22 month:08 pages:627-641 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Firewall Policy Anomaly Visualization FPA FPC |
dewey-raw |
070 |
isfreeaccess_bool |
false |
container_title |
Multimedia tools and applications |
authorswithroles_txt_mv |
Kim, Ui-Hyong @@aut@@ Kang, Jung-Min @@aut@@ Lee, Jae-Sung @@aut@@ Kim, Hyong-Shik @@aut@@ Jung, Soon-Young @@aut@@ |
publishDateDaySort_date |
2013-08-22T00:00:00Z |
hierarchy_top_id |
189064145 |
dewey-sort |
270 |
id |
OLC2035011027 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035011027</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503192653.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2013 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-013-1673-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035011027</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-013-1673-8-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kim, Ui-Hyong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical firewall policy inspection using anomaly detection and its visualization</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2013</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewall</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Policy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Anomaly</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Visualization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">FPA</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">FPC</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kang, Jung-Min</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lee, Jae-Sung</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Hyong-Shik</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jung, Soon-Young</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">71(2013), 2 vom: 22. Aug., Seite 627-641</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:71</subfield><subfield code="g">year:2013</subfield><subfield code="g">number:2</subfield><subfield code="g">day:22</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:627-641</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-013-1673-8</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">71</subfield><subfield code="j">2013</subfield><subfield code="e">2</subfield><subfield code="b">22</subfield><subfield code="c">08</subfield><subfield code="h">627-641</subfield></datafield></record></collection>
|
author |
Kim, Ui-Hyong |
spellingShingle |
Kim, Ui-Hyong ddc 070 misc Firewall misc Policy misc Anomaly misc Visualization misc FPA misc FPC Practical firewall policy inspection using anomaly detection and its visualization |
authorStr |
Kim, Ui-Hyong |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)189064145 |
format |
Article |
dewey-ones |
070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1380-7501 |
topic_title |
070 004 VZ Practical firewall policy inspection using anomaly detection and its visualization Firewall Policy Anomaly Visualization FPA FPC |
topic |
ddc 070 misc Firewall misc Policy misc Anomaly misc Visualization misc FPA misc FPC |
topic_unstemmed |
ddc 070 misc Firewall misc Policy misc Anomaly misc Visualization misc FPA misc FPC |
topic_browse |
ddc 070 misc Firewall misc Policy misc Anomaly misc Visualization misc FPA misc FPC |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Multimedia tools and applications |
hierarchy_parent_id |
189064145 |
dewey-tens |
070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Multimedia tools and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 |
title |
Practical firewall policy inspection using anomaly detection and its visualization |
ctrlnum |
(DE-627)OLC2035011027 (DE-He213)s11042-013-1673-8-p |
title_full |
Practical firewall policy inspection using anomaly detection and its visualization |
author_sort |
Kim, Ui-Hyong |
journal |
Multimedia tools and applications |
journalStr |
Multimedia tools and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2013 |
contenttype_str_mv |
txt |
container_start_page |
627 |
author_browse |
Kim, Ui-Hyong Kang, Jung-Min Lee, Jae-Sung Kim, Hyong-Shik Jung, Soon-Young |
container_volume |
71 |
class |
070 004 VZ |
format_se |
Aufsätze |
author-letter |
Kim, Ui-Hyong |
doi_str_mv |
10.1007/s11042-013-1673-8 |
dewey-full |
070 004 |
title_sort |
practical firewall policy inspection using anomaly detection and its visualization |
title_auth |
Practical firewall policy inspection using anomaly detection and its visualization |
abstract |
Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. © Springer Science+Business Media New York 2013 |
abstractGer |
Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. © Springer Science+Business Media New York 2013 |
abstract_unstemmed |
Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts. © Springer Science+Business Media New York 2013 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 |
container_issue |
2 |
title_short |
Practical firewall policy inspection using anomaly detection and its visualization |
url |
https://doi.org/10.1007/s11042-013-1673-8 |
remote_bool |
false |
author2 |
Kang, Jung-Min Lee, Jae-Sung Kim, Hyong-Shik Jung, Soon-Young |
author2Str |
Kang, Jung-Min Lee, Jae-Sung Kim, Hyong-Shik Jung, Soon-Young |
ppnlink |
189064145 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11042-013-1673-8 |
up_date |
2024-07-03T23:25:32.301Z |
_version_ |
1803602238953750528 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035011027</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503192653.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2013 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-013-1673-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035011027</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-013-1673-8-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kim, Ui-Hyong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical firewall policy inspection using anomaly detection and its visualization</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2013</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewall</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Policy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Anomaly</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Visualization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">FPA</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">FPC</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kang, Jung-Min</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lee, Jae-Sung</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Hyong-Shik</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jung, Soon-Young</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">71(2013), 2 vom: 22. Aug., Seite 627-641</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:71</subfield><subfield code="g">year:2013</subfield><subfield code="g">number:2</subfield><subfield code="g">day:22</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:627-641</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-013-1673-8</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">71</subfield><subfield code="j">2013</subfield><subfield code="e">2</subfield><subfield code="b">22</subfield><subfield code="c">08</subfield><subfield code="h">627-641</subfield></datafield></record></collection>
|
score |
7.398429 |