Javascript must be enabled to continue!
Centralized Context-Aware Firewall configuration in Virtual Network
View through CrossRef
Modern virtualized networks require dynamic and automated security configurations to avoid vulnerabilities caused by manual setups. This project presents a system that generates and configures firewall rules automatically based on high-level Network Security Requirements (NSRs) specified by administrators. Initially, the administrator uploads a Security Graph (SG), which contains a list of Access Points (APs) representing logical network nodes. Next, the administrator defines NSRs by specifying the source AP, destination AP, and action (ALLOW or DENY) to control network traffic behavior. The system processes these NSRs to compute the optimal placement of firewall instances, generate a minimal and anomaly-free set of firewall rules, and enforce the required security policies with default behaviors like whitelisting or blacklisting. This approach formally guarantees the correctness of the solution, i.e., that all security requirements are satisfied, and it minimizes the number of needed firewalls and firewall rules. This methodology is extensively evaluated using different metrics and tests on both synthetic and real use cases, and compared to the state-of-the-art solutions, showing its superiority.
Title: Centralized Context-Aware Firewall configuration in Virtual Network
Description:
Modern virtualized networks require dynamic and automated security configurations to avoid vulnerabilities caused by manual setups.
This project presents a system that generates and configures firewall rules automatically based on high-level Network Security Requirements (NSRs) specified by administrators.
Initially, the administrator uploads a Security Graph (SG), which contains a list of Access Points (APs) representing logical network nodes.
Next, the administrator defines NSRs by specifying the source AP, destination AP, and action (ALLOW or DENY) to control network traffic behavior.
The system processes these NSRs to compute the optimal placement of firewall instances, generate a minimal and anomaly-free set of firewall rules, and enforce the required security policies with default behaviors like whitelisting or blacklisting.
This approach formally guarantees the correctness of the solution, i.
e.
, that all security requirements are satisfied, and it minimizes the number of needed firewalls and firewall rules.
This methodology is extensively evaluated using different metrics and tests on both synthetic and real use cases, and compared to the state-of-the-art solutions, showing its superiority.
Related Results
Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware
Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware
Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime. This is very dangerous and ca...
Deep packet analysis firewall model
Deep packet analysis firewall model
Firewall (software or hardware device that monitors traffic into and out of the network). It can be classified as stateless or stateful. The existing firewalls are only concerned w...
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
At this time Internet services have become a necessity no longer to provide information services, but have become important so there are many cases of websites being hacked by atta...
Predictive Maintenance on Fortinet Firewall Devices Using Artificial Intelligence
Predictive Maintenance on Fortinet Firewall Devices Using Artificial Intelligence
The growing complexity of enterprise network infrastructures has increased the importance of predictive maintenance for network security devices, particularly firewall systems. In ...
Dynamic deep stateful firewall packet analysis model
Dynamic deep stateful firewall packet analysis model
Due to challenges of COVID -19 pandemic, network is widely used and more networkthreats are evolving, therefore, there is a need to improve network tools in order tocontrol threats...
Defining "Virtual Community"
Defining "Virtual Community"
The rise of the Internet has spawned the prolific use of the adjective “virtual.” Both the popular press and scholarly researchers have written about virtual work, virtual teams, v...
Defining "Virtual Community"
Defining "Virtual Community"
The rise of the Internet has spawned the prolific use of the adjective “virtual.” Both the popular press and scholarly researchers have written about virtual work, virtual teams, v...

