skip to main content
10.1145/1363686.1364197acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

An inference system for detecting firewall filtering rules anomalies

Published:16 March 2008Publication History

ABSTRACT

Firewalls are crucial equipments for protecting private networks. However by only deploying firewalls, administrators are far from securing their enterprises networks. Bad configurations may cause serious security breaches and network vulnerabilities. In particular, conflicting filtering rules lead to block legitimate traffic or to accept unwanted packets.

We present in this paper a new classification method to detect overlaps between packet filters within one firewall. Our method processes a set of filtering rules that have a variable number of fields. A field has a range of values, represented by an interval or a variable length bit string, that may intersect with the corresponding field ranges of other rules. In order to detect overlaps we organize the conditions of each filtering rule in such a way that we can quickly separate non overlapping rules. This strategy allows us to avoid considering the entire rule header in many cases.

References

  1. E. Al-Shaer and H. Hamed. Firewall policy advisor for anomaly detection and rule editing. In Proc. IEEE/IFIP 8th Int. Symp. Integrated Network Management (IM 2003), pages 17--30, Mar 2003.Google ScholarGoogle Scholar
  2. E. Al-Shaer and H. Hamed. Modeling and management of firewall policies. IEEE Transactions on Network and Service Management, 1(1), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Al-Shaer and H. Hamed. Taxonomy of conflicts in network security policies. IEEE Communications Magazine, 44(3), March 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Baboescu and G. Varghese. Fast and scalable conflict detection for packet classifiers. In ICNP '02: Proceedings of the 10th IEEE International Conference on Network Protocols, pages 270--279, Washington, DC, USA, 2002. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. CERT Coordination Center. CERT Advisory CA-2003-20 W32/Blaster worm. www.cert.org/advisoriesCA-2003-20.html.Google ScholarGoogle Scholar
  6. D. Eppstein and S. Muthukrishnan. Internet packet filter management and rectangle geometry. In SODA '01: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, pages 827--835, Philadelphia, PA, USA, 2001. Society for Industrial and Applied Mathematics. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Gouda and X. Liu. Firewall design: Consistency, completeness, and compactness. In ICDCS '04: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS '04), pages 320--327, Washington, DC, USA, 2004. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Gupta and N. McKeown. Algorithms for packet classification. IEEE Network, vol. 15, no. 2, pp. 24--32, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The spread of the sapphire/slammer worm. http://www.caida.org/publications/papers/2003/sapphire/sapphire.html, 2003.Google ScholarGoogle Scholar
  10. J. Qian. Acla: A framework for access control list (acl) analysis and optimization. In Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century, page 4, Deventer, The Netherlands, The Netherlands, 2001. Kluwer, B. V. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Wool. A quantitative study of firewall configuration errors. Computer, 37(6):62--67, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Yuan, J. Mai, Z. Su, H. Chen, C. Chuah, and P. Mohapatra. Fireman: A toolkit for firewall modeling and analysis. In S&P, pages 199--213, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Zhang, M. Winslett, and C. Gunter. On the safety and efficiency of firewall policy deployment. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 33--50, Washington, DC, USA, 2007. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An inference system for detecting firewall filtering rules anomalies

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SAC '08: Proceedings of the 2008 ACM symposium on Applied computing
              March 2008
              2586 pages
              ISBN:9781595937537
              DOI:10.1145/1363686

              Copyright © 2008 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 16 March 2008

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate1,650of6,669submissions,25%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader