skip to main content
10.1145/2379690.2379691acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvizsecConference Proceedingsconference-collections
research-article

Visual analysis of complex firewall configurations

Published:15 October 2012Publication History

ABSTRACT

Firewalls have become essential components in the security concept of almost any modern computer network. Due to their relevance and central location in the network, their programming logic often survives several generations of administrators and hardware. Understanding the logic behind a firewall configuration is thus an important but challenging task for a network administrator. In general, there is a tendency to add new rules while old rules are only rarely changed or removed due to unexpected consequences in the network. In this paper we present a visualization tool to support the network administrator in this complex task of understanding firewall rule sets and object group definitions. The tool consists of a hierarchical sunburst visualization, which logically groups rules or object groups according to their common characteristics, a color-linked configuration editor and classical tree view components for rules and object groups. All these components are interactively linked to enable both exploratory and hypotheses testing tasks aimed at understanding the complex functionality of a firewall configuration. To verify our design, we present two case studies on the analysis of rule usage and on nested object groups and collected feedback from five firewall administrators.

References

  1. R. Becker, S. Eick, and A. Wilks. Visualizing network data. Visualization and Computer Graphics, IEEE Transactions on, 1(1):16--28, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. Bertini, P. Hertzog, and D. Lalanne. SpiralView: towards security policies assessment through visual correlation of network resources with evolution of alarms. In Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on, pages 139--146. IEEE, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Cheswick, H. Burch, and S. Branigan. Mapping and visualizing the internet. In Proc. USENIX Annual Technical Conference, pages 1--12. Citeseer, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Cheswick, S. Bellovin, and A. Rubin. Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 1st edition, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. CISCO. Cisco systems. object groups for acls, September 2010. http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/sec_object_group_acl.html.Google ScholarGoogle Scholar
  6. C. Collins. Docuburst: Document content visualization using language structure. In Proceedings of IEEE Symposium on Information Visualization, Poster Session. Baltimore. Citeseer, 2006.Google ScholarGoogle Scholar
  7. S. Foresti, J. Agutter, Y. Livnat, S. Moon, and R. Erbacher. Visual correlation of network alerts. IEEE Computer Graphics and Applications, pages 48--59, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Goodall, W. Lutters, P. Rheingans, and A. Komlodi. Preserving the big picture: Visual network traffic analysis with tnv. In Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on, pages 47--54. IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Heer, S. Card, and J. Landay. Prefuse: a toolkit for interactive information visualization. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 421--430. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. A. Keim, F. Mansmann, J. Schneidewind, and T. Schreck. Monitoring network traffic with radial traffic analyzer. In Proceedings of the IEEE Symposium on Visual Analytics Science and Technology (VAST '06), 2006.Google ScholarGoogle ScholarCross RefCross Ref
  11. D. A. Keim, J. Schneidewind, and M. Sips. Fp-viz: Visual frequent pattern mining. In Proceedings of IEEE Symposium on Information Visualization (InfoVis '05), Poster Paper, 2005.Google ScholarGoogle Scholar
  12. H. Koike and K. Ohno. SnortView: visualization system of snort logs. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 143--147. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Lee, J. Trost, N. Gibbs, R. Beyah, and J. Copeland. Visual firewall: real-time network security monitor. In Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on, pages 129--136. IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. F. Mansmann, D. A. Keim, S. C. North, B. Rexroad, and D. Sheleheda. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. IEEE Transactions on Visualization and Computer Graphics, 13(6), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. McPherson, K. Ma, P. Krystosk, T. Bartoletti, and M. Christensen. Portvis: a tool for port-based detection of security events. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 73--81. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Morrissey and G. Grinstein. Visualizing firewall configurations using created voids. In 6th International Workshop on Visualization for Cyber Security (VizSec), 2009.Google ScholarGoogle ScholarCross RefCross Ref
  17. H. Shiravi, A. Shiravi, and A. Ghorbani. A survey of visualization systems for network security. Visualization and Computer Graphics, IEEE Transactions on, 99(RapidPosts), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Stasko, R. Catrambone, M. Guzdial, and K. McDonald. An evaluation of space-filling information visualizations for depicting hierarchical structures. International Journal of Human-Computer Studies, 53(5):663--694, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Tran, E. Al-Shaer, and R. Boutaba. PolicyVis: firewall security policy visualization and inspection. In Proceedings of the 21st conference on Large Installation System Administration Conference, pages 1--16. USENIX Association, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Wong, P. Whitney, and J. Thomas. Visualizing association rules for text mining. In InfoVis, page 120. Published by the IEEE Computer Society, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. L. Xiao, J. Gerth, and P. Hanrahan. Enhancing visual analysis of network traffic using a knowledge representation. In Visual Analytics Science And Technology, 2006 IEEE Symposium On, pages 107--114. IEEE, 2006.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Visual analysis of complex firewall configurations

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          VizSec '12: Proceedings of the Ninth International Symposium on Visualization for Cyber Security
          October 2012
          101 pages
          ISBN:9781450314138
          DOI:10.1145/2379690

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 October 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate39of111submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader