Firewall Policy Reconstruction by Active Probing: An Attacker's View
暂无分享,去创建一个
T. Samak | Hong Li | E. Al-Shaer | A. El-Atawy | E. Al-Shaer | A. El-Atawy | T. Samak | Hong Li
[1] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[2] John Wack,et al. Guidelines on Firewalls and Firewall Policy , 2002 .
[3] Avishai Wool,et al. Fang: a firewall analysis engine , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Terry Martin,et al. Benchmarking Methodology for Firewall Performance , 2003, RFC.
[5] Yongyuth Permpoontanalarp,et al. A graph-based methodology for analyzing IP spoofing attack , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[6] Mohamed G. Gouda,et al. Firewall design: consistency, completeness, and compactness , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[7] Michael R. Lyu,et al. Firewall security: policies, testing and performance evaluation , 2000, Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000.
[8] Sonia Fahmy,et al. Analysis of vulnerabilities in Internet firewalls , 2003, Comput. Secur..