skip to main content
10.1145/1866898.1866902acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

FAME: a firewall anomaly management environment

Published:04 October 2010Publication History

ABSTRACT

Firewalls are a widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the firewall. However, designing and managing firewall policies are often error-prone due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools. This paper represents an innovative anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions. In particular, we articulate a grid-based representation technique for providing an intuitive cognitive sense about policy anomaly and facilitating efficient policy anomaly management. In addition, we demonstrate the feasibility and applicability of our framework through a proof-of-concept prototype of a visualization-based firewall policy analysis tool called Firewall Anomaly Management Environment (FAME).

References

  1. }}A Systematic Approach for Conflict Resolution in Firewall Policies. Technical Report ASU-SCIDSE-10-2, Arizona State University, Tempe, May 2010. http: //sefcom.asu.edu/confres/confres.pdf.Google ScholarGoogle Scholar
  2. }}Buddy version 2.4. http://sourceforge.net/projects/buddy.Google ScholarGoogle Scholar
  3. }}TENABLE Network Security. http://www.nessus.org/nessus.Google ScholarGoogle Scholar
  4. }}Tissynbe.py. http://www.tssci-security.com/projects/tissynbe_py.Google ScholarGoogle Scholar
  5. }}E. Al-Shaer and H. Hamed. Firewall Policy Advisor for anomaly discovery and rule editing. In Integrated Network Management, 2003. IFIP/IEEE Eighth International Symposium on, pages 17--30, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  6. }}E. Al-Shaer and H. Hamed. Discovery of policy anomalies in distributed firewalls. In IEEE INFOCOM, volume 4, pages 2605--2616, 2004.Google ScholarGoogle Scholar
  7. }}E. Al-Shaer, W. Marrero, A. El-Atawy, and K. ElBadawi. Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. In Proceedings of the 17th IEEE International Conference on Network Protocols (ICNP), pages 123--132, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}J. Alfaro, N. Boulahia-Cuppens, and F. Cuppens. Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 7(2):103--122, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}F. Baboescu and G. Varghese. Fast and scalable conflict detection for packet classifiers. Computer Networks, 42(6):717--735, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit. ACM Transactions on Computer Systems (TOCS), 22(4):381--420, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}S. Bellovin. Distributed firewalls. Journal of Login, 24(5):37--39, 1999.Google ScholarGoogle Scholar
  12. }}C. Brodie, C. Karat, and J. Karat. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. In Proceedings of the second symposium on Usable privacy and security, page 19. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. }}E. Chew, M. Swanson, K. Stine, N. Bartol, A. Brown, and W. Robinson. Performance measurement guide for information security. NIST Special Publication, pages 800--55, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}A. El-Atawy, K. Ibrahim, H. Hamed, and E. Al-Shaer. Policy segmentation for intelligent firewall testing. In 1st Workshop on Secure Network Protocols (NPSec 2005), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}A. El-Atawy, T. Samak, E. Al-Shaer, and H. Li. Using online traffic statistical matching for optimizing packet filtering performance. In IEEE INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pages 866--874, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. }}M. Frigault, L. Wang, A. Singhal, and S. Jajodia. Measuring network security using dynamic bayesian network. In Proceedings of the 4th ACM workshop on Quality of protection, pages 23--30. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}M. Gouda and X. Liu. Firewall Design: Consistency, Completeness, and Compactness. In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04), page 327. IEEE Computer Society, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. }}I. Herman, G. Melançon, and M. Marshall. Graph visualization and navigation in information visualization: A survey. IEEE Transactions on Visualization and Computer Graphics, pages 24--43, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith. Implementing a distributed firewall. In Proceedings of the 7th ACM conference on Computer and communications security, page 199. ACM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. }}A. Liu and M. Gouda. Complete redundancy detection in firewalls. Data and Applications Security XIX, pages 193--206, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. }}A. Mayer, A. Wool, and E. Ziskind. Fang: A firewall analysis engine. In IEEE Symposium on Security and Privacy, pages 177--189. IEEE Computer Society, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. }}P. Mell, K. Scarfone, and S. Romanosky. A complete guide to the common vulnerability scoring system version 2.0. In Published by FIRST-Forum of Incident Response and Security Teams, June, 2007.Google ScholarGoogle Scholar
  23. }}G. Misherghi, L. Yuan, Z. Su, C.-N. Chuah, and H. Chen. A general framework for benchmarking firewall optimization techniques. IEEE Transactions on Network and Service Management, 5(4):227--238, Dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. }}R. Reeder, L. Bauer, L. Cranor, M. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1473--1482. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. }}M. Sahinoglu. Security meter: A practical decision-tree model to quantify risk. IEEE security & privacy, pages 18--24, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. }}R. Sawilla and X. Ou. Identifying Critical Attack Assets in Dependency Attack Gaphs. In 13th European Symposium on Research in Computer Security (ESORICS). Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. }}T. Tran, E. Al-Shaer, and R. Boutaba. PolicyVis: firewall security policy visualization and inspection. In Proceedings of the 21st conference on Large Installation System Administration Conference, pages 1--16. USENIX Association, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. }}A. Wool. Architecting the lumeta firewall analyzer. In Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, page 7. USENIX Association, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. }}L. Yuan, H. Chen, J. Mai, C. Chuah, Z. Su, P. Mohapatra, and C. Davis. Fireman: A toolkit for firewall modeling and analysis. In 2006 IEEE Symposium on Security and Privacy, page 15, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. }}L. Yuan, C. Chuah, and P. Mohapatra. ProgME: towards programmable network measurement. ACM SIGCOMM Computer Communication Review, 37(4):108, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. FAME: a firewall anomaly management environment

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SafeConfig '10: Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
        October 2010
        98 pages
        ISBN:9781450300933
        DOI:10.1145/1866898

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 October 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate22of61submissions,36%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader