Anomaly detection: Firewalls capabilities and limitations

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Firewalls are the most deployed basic security devices that are used to protect private networks from unauthorized accesses and intrusions. Firewall's security protection depends mainly on the quality of the firewall's configured policies. However, as firewalls policies grow in size, the interactions between policies of the same firewall or different firewalls become complex, which makes it difficult to design and manage firewalls policies in large scale systems. This paper identifies and compares recent firewall anomaly management frameworks, tools, and algorithms. It compares the anomaly management approaches in terms of visual representation, need for manual interference, existence of implementation, features, and limitations. It also classifies these approaches as single or distributed architectures, and the modes of these approaches as real-Time or offline. Useful recommendations are provided as a result of this study.

Original languageEnglish
Title of host publication2018 International Conference on Computing Sciences and Engineering, ICCSE 2018 - Proceedings
EditorsHazem Raafat, Mostafa Abd-El-Barr, Muhammad Sarfraz, Paul Manuel
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-5
Number of pages5
ISBN (Electronic)9781538646809
DOIs
StatePublished - 5 Jun 2018

Publication series

Name2018 International Conference on Computing Sciences and Engineering, ICCSE 2018 - Proceedings

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Keywords

  • Anomalies
  • Detection
  • Firewalls
  • Large Scale Systems
  • Resolution

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Signal Processing
  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'Anomaly detection: Firewalls capabilities and limitations'. Together they form a unique fingerprint.

Cite this