Show simple item record

dc.contributor.authorBandara, A. K.en
dc.contributor.authorKakas, Antonis C.en
dc.contributor.authorLupu, E. C.en
dc.contributor.authorRusso, A.en
dc.creatorBandara, A. K.en
dc.creatorKakas, Antonis C.en
dc.creatorLupu, E. C.en
dc.creatorRusso, A.en
dc.date.accessioned2019-11-13T10:38:24Z
dc.date.available2019-11-13T10:38:24Z
dc.date.issued2009
dc.identifier.isbn978-1-4244-3487-9
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/53607
dc.description.abstractFirewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall configurations for errors, to verify that they correctly implement security requirements and to generate configurations from higher-level requirements. In this paper we extend our previous work on the use of formal argumentation and preference reasoning for firewall policy analysis and develop means to automatically generate firewall policies from higher-level requirements. This permits both analysis and generation to be done within the same framework, thus accommodating a wide variety of scenarios for authoring and maintaining firewall configurations. We validate our approach by applying it to both examples from the literature and real firewall configurations of moderate size (̃ 150 rules). © 2009 IEEE.en
dc.source2009 IFIP/IEEE International Symposium on Integrated Network Management, IM 2009en
dc.source2009 IFIP/IEEE International Symposium on Integrated Network Management, IM 2009en
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-70449344286&doi=10.1109%2fINM.2009.5188808&partnerID=40&md5=a74861d63aeca262187cb39d0b987a03
dc.subjectNetwork managementen
dc.subjectComputer virusesen
dc.subjectSecurity requirementsen
dc.subjectComputer system firewallsen
dc.subjectConfiguration managementen
dc.subjectCorporate networksen
dc.subjectFirewall policiesen
dc.subjectFormal argumentationen
dc.subjectNetwork sizeen
dc.subjectPerimeter securityen
dc.subjectPreference reasoningen
dc.titleUsing argumentation logic for firewall configuration managementen
dc.typeinfo:eu-repo/semantics/conferenceObject
dc.identifier.doi10.1109/INM.2009.5188808
dc.description.startingpage180
dc.description.endingpage187
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeConference Objecten
dc.description.notes<p>Conference code: 78288en
dc.description.notesCited By :22</p>en
dc.contributor.orcidKakas, Antonis C. [0000-0001-6773-3944]
dc.gnosis.orcid0000-0001-6773-3944


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record