Next generation firewalls for dynamic coalitions

Firewalls represent a critical security building block for networks as they monitor and control incoming and outgoing network traffic based on the enforcement of predetermined security rules, referred to as firewall rules. Firewalls are constantly being improved to enhance network security. From being a simple filtering device, firewall has been evolved to operate in conjunction in intrusion detection and prevention systems. This paper reviews the existing firewall policies and assesses their application in highly dynamic networks such as coalitions networks. The paper also describe the need for the next-generation firewall policies and how the generative policy model can be leveraged.

[1]  Elisa Bertino,et al.  A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[2]  Gene T. Whipps,et al.  A dynamic infrastructure for interconnecting disparate ISR/ISTAR assets (the ITA sensor fabric) , 2009, 2009 12th International Conference on Information Fusion.

[3]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[4]  Ehab Al-Shaer,et al.  Adaptive Statistical Optimization Techniques for Firewall Packet Filtering , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[6]  Elisa Bertino,et al.  A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection , 2017, IEEE Transactions on Software Engineering.

[7]  Supriyo Chakraborty,et al.  Multitiered inference management architecture for participatory sensing , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[8]  Elisa Bertino,et al.  Heimdall: Mitigating the Internet of Insecure Things , 2017, IEEE Internet of Things Journal.

[9]  Ehab Al-Shaer,et al.  Conflict classification and analysis of distributed firewall policies , 2005, IEEE Journal on Selected Areas in Communications.

[10]  Mani B. Srivastava,et al.  A framework for context-aware privacy of sensor data on mobile systems , 2013, HotMobile '13.

[11]  Alessandra Russo,et al.  Using argumentation logic for firewall configuration management , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.