Downloads: 118 | Views: 295
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.3 / 10
Policy Optimization and Anomaly Detection of Firewall
Akshay Dattatray Kachare, Geeta Atkar
Abstract: Firewalls are core entity in network security. Though, management of firewall rules/policies, mainly in multiple firewall enterprise networks, has grown to be a complex and error-prone task. A firewall always checks every incoming or outgoing packet to decide which packet should be accept or discard based on its policy. To avoid policy anomalies, it must be consider that firewall filtering rules must be written, well-organized and distributed suspiciously. These firewall policy anomalies might cause network vulnerability. Hence, insertion or modification of filtering rules in every firewall requires thorough intra-firewall and inter-firewall analysis. This analysis determines the correct rule position and order in the firewalls. In this paper, firstly, identification of all anomalies which may exist in a single or multiple firewall environments is addressed with various anomaly detection techniques. Secondly, this paper describes the cross-domain privacy-preserving protocol for cooperative firewall policy optimization. Specially, for several two neighbouring firewalls belonging to two different administrative domains, protocol which is define in this paper may identify in every firewall policies that can be eliminated because of the another firewall.
Keywords: firewall optimization, anomaly detection, privacy preservation
Edition: Volume 4 Issue 7, July 2015
Pages: 1006 - 1010
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 1659 - 1668Anomaly Detection: Enhancing Systems with Machine Learning
Yogananda Domlur Seetharama
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024
Pages: 844 - 850Data-Driven Decision Making: Advanced Database Systems for Business Intelligence
Maria Anurag Reddy Basani, Anudeep Kandi
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 9, September 2022
Pages: 1284 - 1287Leveraging Deep Learning for Enhanced Fraud Detection in Banking: A Comprehensive Analysis of Strategies and Future Directions
Harish Narne
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 2571 - 2575Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation
Harish Narne