Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network

  Advanced Search  

Analysis of Firewall Policy Rules Using Data Mining Techniques

Summary: Analysis of Firewall Policy Rules
Using Data Mining Techniques
Korosh Golnabi, Richard K. Min, Latifur Khan
Department of Computer Science
The University of Texas at Dallas
Richardson, USA
(koroshg, m010300, lkhan)@utdallas.edu
Ehab Al-Shaer
Multimedia Networking Research Laboratory
DePaul University
Chicago, USA
Abstract-- Firewall is the de facto core technology of today's
network security and defense. However, the management of
firewall rules has been proven to be complex, error-prone, costly
and inefficient for many large-networked organizations. These
firewall rules are mostly custom-designed and hand-written thus
in constant need for tuning and validation, due to the dynamic
nature of the traffic characteristics, ever-changing network
environment and its market demands. One of the main problems


Source: Al-Shaer, Ehab - School of Computer Science, Telecommunications and Information Systems, DePaul University


Collections: Computer Technologies and Information Sciences