Abstract
Firewalls are the most deployed basic security devices that are used to protect private networks from unauthorized accesses and intrusions. Firewall's security protection depends mainly on the quality of the firewall's configured policies. However, as firewalls policies grow in size, the interactions between policies of the same firewall or different firewalls become complex, which makes it difficult to design and manage firewalls policies in large scale systems. This paper identifies and compares recent firewall anomaly management frameworks, tools, and algorithms. It compares the anomaly management approaches in terms of visual representation, need for manual interference, existence of implementation, features, and limitations. It also classifies these approaches as single or distributed architectures, and the modes of these approaches as real-Time or offline. Useful recommendations are provided as a result of this study.
| Original language | English |
|---|---|
| Title of host publication | 2018 International Conference on Computing Sciences and Engineering, ICCSE 2018 - Proceedings |
| Editors | Hazem Raafat, Mostafa Abd-El-Barr, Muhammad Sarfraz, Paul Manuel |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 1-5 |
| Number of pages | 5 |
| ISBN (Electronic) | 9781538646809 |
| DOIs | |
| State | Published - 5 Jun 2018 |
Publication series
| Name | 2018 International Conference on Computing Sciences and Engineering, ICCSE 2018 - Proceedings |
|---|
Bibliographical note
Publisher Copyright:© 2018 IEEE.
Keywords
- Anomalies
- Detection
- Firewalls
- Large Scale Systems
- Resolution
ASJC Scopus subject areas
- Computer Networks and Communications
- Computer Science Applications
- Computer Vision and Pattern Recognition
- Signal Processing
- Modeling and Simulation