Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2007, Vol. 24 ›› Issue (2): 257-265.DOI: 10.7523/j.issn.2095-6134.2007.2.019

• 简报 • Previous Articles     Next Articles

Analysis of distributed firewall policy configuration mistakes and their detection

WANG Wei-Ping, CHEN Wen-Hui, ZHU Wei-Wei, CHEN Hua-Ping, YANG Jie   

  1. 1 School of Management, University of Science & Technology of China, Hefei, 230026)
    2 Information Center, Public Security Department of Jiangsu, Nanjing, 210024
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-03-15

Abstract: As a traditional information security technology (IST), distributed firewall is playing an important role while some problems exist within. Conflicts always appear in distributed firewall policy which brings out the security menace. After discussions of some relations between the rules of firewall, this paper demonstrates the probable mistakes which might exist in policy configuration, and also introduced an algorithm of mistake-detecting about policy configuration. Finally, the direction of further researching is also presented.

Key words: Firewall Distribute Policy Rule Conflict Algorithm

CLC Number: