Sciweavers

Share
IJISEC
2008

Complete analysis of configuration rules to guarantee reliable network security policies

9 years 4 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the security policy in current corporate networks. To properly configure these components, it is necessary to use several sets of security rules. Nevertheless, the existence of anomalies between those rules, particularly in distributed multi-component scenarios, is very likely to degrade the network security policy. The discovery and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a complete set of mechanisms for such a management. Keywords Network Security
Joaquín García-Alfaro, Nora Boulahia
Added 25 Jan 2011
Updated 25 Jan 2011
Type Journal
Year 2008
Where IJISEC
Authors Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens
Comments (0)
books