Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly
暂无分享,去创建一个
[1] Heejo Lee,et al. Abnormal Policy Detection and Correction Using Overlapping Transition , 2010, IEICE Trans. Inf. Syst..
[2] Ehab Al-Shaer,et al. Taxonomy of conflicts in network security policies , 2006, IEEE Communications Magazine.
[3] Rafael M. Gasca,et al. CSP-Based Firewall Rule Set Diagnosis using Security Policies , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[4] Mohamed G. Gouda,et al. Structured firewall design , 2007, Comput. Networks.
[5] Martin Roesch,et al. SNORT: The Open Source Network Intrusion Detection System 1 , 2002 .
[6] Ehab Al-Shaer,et al. Conflict classification and analysis of distributed firewall policies , 2005, IEEE Journal on Selected Areas in Communications.
[7] N. Cuppens,et al. Detection and Removal of Firewall Misconfiguration , 2019 .
[8] Rafael M. Gasca,et al. Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[9] Zhan Zhang,et al. Reducing the Size of Rule Set in a Firewall , 2007, 2007 IEEE International Conference on Communications.
[10] Ehab Al-Shaer,et al. Modeling and Management of Firewall Policies , 2004, IEEE Transactions on Network and Service Management.
[11] Mohamed G. Gouda,et al. Firewall design: consistency, completeness, and compactness , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[12] Mohamed G. Gouda,et al. Diverse Firewall Design , 2004, IEEE Transactions on Parallel and Distributed Systems.
[13] Reihaneh Safavi-Naini,et al. Comparing and debugging firewall rule tables , 2007, IET Inf. Secur..
[14] Hyoung Joong Kim,et al. Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting , 2010 .
[15] Nora Cuppens-Boulahia,et al. Complete analysis of configuration rules to guarantee reliable network security policies , 2008, International Journal of Information Security.
[16] Avishai Wool,et al. A quantitative study of firewall configuration errors , 2004, Computer.
[17] Randal E. Bryant,et al. Graph-Based Algorithms for Boolean Function Manipulation , 1986, IEEE Transactions on Computers.
[18] Nora Cuppens-Boulahia,et al. Aggregating and Deploying Network Access Control Policies , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[19] Heejo Lee,et al. Reducing Payload Inspection Cost Using Rule Classification for Fast Attack Signature Matching , 2009, IEICE Trans. Inf. Syst..
[20] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[21] Bhavani M. Thuraisingham,et al. Detection and Resolution of Anomalies in Firewall Policy Rules , 2006, DBSec.