Institutional Repository
Institutional Repository Institutional Repository Login  Institutional Repository  
  • UOC Library |
  •  |
  •  |

Home >
Research >
Techonology and Communication >
Computer Science, Technology and Multimedia >
Articles >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10609/1319
Title: Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies
Authors: García Alfaro, Joaquín
Cuppens, Nora
Cuppens, Frederic
Other: K-ryptography and Information Security for Open Networks. KISON
Issue Date: 16-Feb-2010
Type: Article
Citation: GARCIA-ALFARO, J.; CUPPENS, N.; CUPPENS, F. (2008). "Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies". In: International Journal of Information Security. 7 (2), pp. 103-122.
Abstract: The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the security policy in current corporate networks. To properly configure these components, it is necessary to use several sets of security rules. Nevertheless, the existence of anomalies between those rules, particularly in distributed multi-component scenarios, is very likely to degrade the network security policy. The discovery and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a complete set of mechanisms for such a management.
Description: Peer-reviewed
URI: http://hdl.handle.net/10609/1319
Access rights: The original publication is available at: http://link.springer.com/article/10.1007/s10207-007-0045-7
Appears in Collections:Articles

Scimago Journal Rank:

Add This:

RefWorks:

Ratings:
  0 (0 valuations)


Files in This Item:

File Description SizeFormat
Alfaro_IJIS07_Complete_preprint.pdfPre-print687.3 kBAdobe PDFPreview  Download

Author names in Twitter


Author names in FriendFeed



Recommend this item

SFX Query

Items in Repository e are protected by copyright, with all rights reserved, unless otherwise indicated.

 

The library replies
A product of the Universitat Oberta de Catalunya Virtual Library