Detecting and Resolving Firewall Policy Anomalies
The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled one to perform business services more efficiently and effectively. However, the authors still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the firewall. Unfortunately, designing and managing firewall policies are often error prone due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools.