Measuring firewall security

  • Saeed Al-Haj*
  • , Ehab Al-Shaer
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

In the recent years, more attention is given to firewalls as they are considered the corner stone in Cyber defense perimeters. The ability to measure the quality of protection of a firewall policy is a key step to assess the defense level for any network. To accomplish this task, it is important to define objective metrics that are formally provable and practically useful. In this work, we propose a set of metrics that can objectively evaluate and compare the hardness and similarities of access policies of single firewalls based on rules tightness, the distribution of the allowed traffic, and security requirements. In order to analyze firewall polices based on the policy semantic, we used a canonical representation of firewall rules using Binary Decision Diagrams (BDDs) regardless of the rules format and representation. The contribution of this work comes in measuring and comparing firewall security deterministically in term of security compliance and weakness in order to optimize security policy and engineering.

Original languageEnglish
Title of host publication2011 4th Symposium on Configuration Analytics and Automation, SAFECONFIG 2011
DOIs
StatePublished - 2011
Externally publishedYes
EventIEEE 4th Symposium on Configuration Analytics and Automation, SAFECONFIG 2011 - Arlington, VA, United States
Duration: 31 Oct 20111 Nov 2011

Publication series

Name2011 4th Symposium on Configuration Analytics and Automation, SAFECONFIG 2011

Conference

ConferenceIEEE 4th Symposium on Configuration Analytics and Automation, SAFECONFIG 2011
Country/TerritoryUnited States
CityArlington, VA
Period31/10/111/11/11

ASJC Scopus subject areas

  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Measuring firewall security'. Together they form a unique fingerprint.

Cite this