Skip to:Content
|
Bottom
Cover image for Firewall design and analysis /cAlex X. Liu
Title:
Firewall design and analysis /cAlex X. Liu
Personal Author:
Series:
Computer and network security ; 4
Publication Information:
Singapore : World Scientific, 2010
Physical Description:
xi, 109 p. : ill. ; 24 cm.
ISBN:
9789814261654

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010267195 TK5105.59 L57 2011 Open Access Book Book
Searching...

On Order

Summary

Summary

This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies.
This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.


Table of Contents

Prefacep. vii
1 Prologuep. 1
1.1 Background and Motivationp. 1
1.2 Previous Workp. 3
1.2.1 Previous Work on Firewall Designp. 3
1.2.2 Previous Work on Firewall Analysisp. 4
1.3 Contributions of the Bookp. 5
1.3.1 Structured Firewall Designp. 5
1.3.2 Diverse Firewall Designp. 6
1.3.3 Stateful Firewall Modelp. 6
1.3.4 Firewall Queriesp. 7
1.3.5 Firewall Redundancy Detectionp. 8
1.4 Overview of the Bookp. 8
2 Structured Firewall Designp. 9
2.1 Motivationp. 9
2.1.1 Consistency, Completeness and Compactnessp. 9
2.1.2 Structured Firewall Designp. 12
2.2 Firewall Decision Diagramsp. 13
2.3 FDD Reductionp. 17
2.4 FDD Markingp. 18
2.5 Firewall Generationp. 21
2.6 Firewall Compactionp. 23
2.7 Firewall Simplificationp. 26
2.8 Summary of Structured Firewall Designp. 28
3 Diverse Firewall Designp. 31
3.1 Construction Algorithmp. 35
3.2 Shaping Algorithmp. 37
3.2.1 FDD Simplifyingp. 39
3.2.2 Node Shapingp. 39
3.2.3 FDD Shapingp. 43
3.3 Comparison Algorithmp. 44
3.4 Experimental Resultsp. 45
4 Stateful Firewall Modelp. 49
4.1 Firewall Modelp. 51
4.2 Firewall Examplesp. 56
4.2.1 Example I: Tracking Outgoing Packetsp. 56
4.2.2 Example II: Tracking FTP Ptotocolp. 57
4.3 Removing Packets from Firewall Statep. 60
4.4 Firewall Statesp. 62
4.4.1 Truly Stateful and Truly Stateless Firewallsp. 63
4.4.2 Stateless Derivativesp. 64
4.5 Firewall Propertiesp. 65
4.5.1 Conforming Firewallsp. 65
4.5.2 Proper Firewallsp. 66
5 Firewall Queriesp. 69
5.1 Structured Firewall Query Languagep. 72
5.1.1 Firewallsp. 72
5.1.2 Query Languagep. 73
5.2 Firewall Query Examplesp. 74
5.3 Firewall Query Processingp. 77
5.4 FDT-based Firewall Query Processing Algorithmp. 79
5.5 Experimental Resultsp. 80
6 Firewall Redundancy Detectionp. 83
6.1 Firewall Redundant Rulesp. 86
6.2 Removing Upward Redundancyp. 88
6.3 Removing Downward Redundancyp. 94
6.4 Experimental Resultsp. 98
7 Epiloguep. 101
7.1 Conclusionsp. 101
Acknowledgmentsp. 103
Bibliographyp. 105
Indexp. 109
Go to:Top of Page