Firewall Management for to Resolve the Policy Anomalies
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 5
Abstract
Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis tools, such as Firewall Policy Advisor and FIREMAN, they can only detect the policy anomaly cannot resolve these anomalies, and detection time was also increased. Therefore, I represent an innovative policy anomaly management framework for firewalls, it is a rule-based segmentation technique. In which a visualization-based firewall policy analysis tool called Firewall Anomaly Management Environment (FAME).Then the searching space and detection time for resolving conflicts was also reduced by the correlation process. It used for discovering and resolve anomalies in firewall policies.
Authors and Affiliations
V. Varalakshmi
Secure Authentication Protocol to Detect Sybil Attacks in MANETs
Mobile ad-hoc networks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In...
A SURVEY OF TOOLS FOR EXTRACTING AND ALIGNING THE DATA IN WEB
The world-wide web is rapidly growing day by day in all fields, mining the data from multiple websites is necessary to filter the relevant contents. Although many approaches developed for extracting the data, there were...
BLUETOOTH SECURITY THREATS
Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technolog...
Generation of Addition Chain using Deterministic Division Based Method
Efficiency of a cryptosystem depends not only on the security it provides, but also it increases the operational speed thereby it reduces the time taken for encryption and decryption. In most numbertheoretic cryptographi...
Merge Technique for Automated Reconstruction of Large Image
This paper present an automated reconstruction high level architectural specification of image merging for satellite image capturing system, aiming at implementing a real-time satellite image processing system for mergin...