ارسل ملاحظاتك

ارسل ملاحظاتك لنا







A Formal Basis For The Design And Analysis Of Firewall Security Policies

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Khoumsi, Ahmed (Author)
مؤلفين آخرين: Erradi, Mohammed (Co-Author) , Krombi, Wadie (Co-Author)
المجلد/العدد: مج30, ع1
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2018
الصفحات: 51 - 66
DOI: 10.33948/0584-030-001-006
ISSN: 1319-1578
رقم MD: 974320
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Firewall Security Policy | Automata Based Policy | Completeness Verification | Anomaly Detection | Discrepancy Detection | Mixable Policy | Space And Time Complexities
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02148nam a22002537a 4500
001 1717118
024 |3 10.33948/0584-030-001-006 
041 |a eng 
044 |b السعودية 
100 |9 524475  |a Khoumsi, Ahmed  |e Author 
245 |a A Formal Basis For The Design And Analysis Of Firewall Security Policies 
260 |b جامعة الملك سعود  |c 2018 
300 |a 51 - 66 
336 |a بحوث ومقالات  |b Article 
520 |b  A firewall is the core of a well defined network security policy. This paper presents an automata-based method to study firewall security policies. We first propose a procedure that syn- thesizes an automaton that describes a security policy given as a table of rules. The synthesis pro- cedure is then used to develop procedures to detect: incompleteness, anomalies and discrepancies in security policies. A method is developed to represent the automaton by a policy qualified as mixable and that has practical utilities, such as ease to determine the whitelist and the blacklist of the policy. The developed procedures have been deeply evaluated in terms of time and space complexities. Then, a real case study has been investigated. The obtained results confirm that the developed pro- cedures have reasonable complexities and that their actual execution times are of the order of sec- onds. Finally, proofs of all results are provided.  
653 |a تكنولوجيا الاتصالات  |a شبكة الإنترنت  |a أمن المعلومات 
692 |b Firewall Security Policy  |b Automata Based Policy  |b Completeness Verification  |b Anomaly Detection  |b Discrepancy Detection  |b Mixable Policy  |b Space And Time Complexities 
700 |9 525534  |a Erradi, Mohammed  |e Co-Author 
700 |9 525535  |a Krombi, Wadie  |e Co-Author 
773 |c 006  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 001  |m مج30, ع1  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 030  |x 1319-1578 
856 |u 0584-030-001-006.pdf 
930 |d y  |p y 
995 |a science 
999 |c 974320  |d 974320 

عناصر مشابهة