›› 2007, Vol. 24 ›› Issue (3): 372-379.DOI: 10.7523/j.issn.2095-6134.2007.3.017
• 简报 • Previous Articles Next Articles
WANG Wei-Ping, CHEN Wen-Hui, LI Zhe-Peng, CHEN Hua-Ping
Received:
Revised:
Online:
Abstract: As a traditional technique of information security, firewall has taken very important position. Security administrators frequently have to compare firewall policies looking for inconsistence, while it is not a smooth process to choose a platform for the comparison. To realize the comparison between firewalls’ policies, this paper provides FPT(firewall policy tree) model, and the construction algorithm which can turn a firewall policy into a policy tree, as well as the comparison algorithm, finally presents the procedures of comparing firewalls’ policies. Combination of the two algorithms can be used to perform a comparison between firewalls’ policies. By doing this, the paper can obtain the set of data packages on which different firewalls have made inconsistent filter decision, and finds out the inconsistency in firewalls’ policies.
Key words: Firewall Policy Comparison Algorithm
CLC Number:
TN915. 08
WANG Wei-Ping, CHEN Wen-Hui, LI Zhe-Peng, CHEN Hua-Ping. Algorithm for Detecting Firewall Policy Inconsistency[J]. , 2007, 24(3): 372-379.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://journal.ucas.ac.cn/EN/10.7523/j.issn.2095-6134.2007.3.017
http://journal.ucas.ac.cn/EN/Y2007/V24/I3/372