Firewall Management for to Resolve the Policy Anomalies

Abstract

Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis tools, such as Firewall Policy Advisor and FIREMAN, they can only detect the policy anomaly cannot resolve these anomalies, and detection time was also increased. Therefore, I represent an innovative policy anomaly management framework for firewalls, it is a rule-based segmentation technique. In which a visualization-based firewall policy analysis tool called Firewall Anomaly Management Environment (FAME).Then the searching space and detection time for resolving conflicts was also reduced by the correlation process. It used for discovering and resolve anomalies in firewall policies.

Authors and Affiliations

V. Varalakshmi

Keywords

Related Articles

Improving the Network Lifetime of MANETs through CSP routing Algorithm

Cooperative Communication is a technique that allows multiple node to transmit the same data. In this paper propose a Cooperative Shortest Path (CSP) Routing Algorithm for Mobile ad hoc Network (MANETs).Cooperative Short...

Scale Development for Improving Education Quality: A Survey of Private Institutions Affiliated to U.P.T.U.

Role of scale development is to create a measure of a construct “Education Quality in U.P.T.U. (Uttar Pradesh Technical University) affiliated institutions”. In present scenario, Uttar Pradesh has a credible infrastructu...

Annotation of web pages using semantic tagging and ranking model to effective information retrieval

Due to continuous growth of World Wide Web (WWW), huge number of web documents is published in web servers providing plentiful information. Because of the structure of web pages and huge amount of information, retrieving...

IMAGE MINING TECHNIQUES: A LITERATURE SURVEY

Nowadays, a large portion of information is in visual form; it is essential and certainly pleasing to search for images. Image mining has a variety of applications in various sectors like medical diagnosis, biology, remo...

A comparative study of fuzzy logic and weighted Association rule mining in frequent datasets

Mining of frequent patterns in transaction databases has been a fashionable area of research. Many methods are being used to solve the trouble of discovering association rules among items in large databases [8]. Transact...

Download PDF file
  • EP ID EP127399
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

V. Varalakshmi (2015). Firewall Management for to Resolve the Policy Anomalies. International Journal of Computer Science & Engineering Technology, 6(5), 276-279. https://www.europub.co.uk/articles/-A-127399