This paper presents a classification of the anomalies that can appear when designing or implementing communication protection policies. Together with the already known intra- and inter-policy anomaly types, we introduce a novel category, the inter-technology anomalies, related to security controls implementing different technologies, both within the same network node and among different network nodes. Through an empirical assessment, we prove the practical significance of detecting this new anomaly class. Furthermore, this paper introduces a formal model, based on first-order logic rules that analyses the network topology and the security controls at each node to identify the detected anomalies and suggest the strategies to resolve them. Th...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
Nowadays, there is a huge and growing concern about security in information and communication techno...
Firewalls are a widely deployed security mechanism to ensure the security of private networks in mos...
This paper presents a classification of the anomalies that can appear when designing or implementing...
Usually network administrators implement a protection policy by refining a set of (abstract) communi...
Nowadays, computers and network communications have a pervasive presence in all our daily activities...
The complexity of network topology together with heterogeneity of network services make the network ...
One of the key challenges in computer networks is network security. For securing the network, variou...
Abstract: The use of different network security components, such as firewalls and network intrusion ...
Computer networks have become an important part of modern society, and computer network security is ...
Part 4: Access ControlInternational audienceA security policy consists of a set of rules designed to...
Peer-reviewedThe use of different network security components, such as firewalls and network intrusi...
Most of the business services have been performing very effectively by using some of the evolving te...
Firewalls are core elements in networksecurity. However, managing firewall rules is anerror-prone ta...
Application firewalls are increasingly used to inspect upper-layer protocols (as HTTP) that are the ...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
Nowadays, there is a huge and growing concern about security in information and communication techno...
Firewalls are a widely deployed security mechanism to ensure the security of private networks in mos...
This paper presents a classification of the anomalies that can appear when designing or implementing...
Usually network administrators implement a protection policy by refining a set of (abstract) communi...
Nowadays, computers and network communications have a pervasive presence in all our daily activities...
The complexity of network topology together with heterogeneity of network services make the network ...
One of the key challenges in computer networks is network security. For securing the network, variou...
Abstract: The use of different network security components, such as firewalls and network intrusion ...
Computer networks have become an important part of modern society, and computer network security is ...
Part 4: Access ControlInternational audienceA security policy consists of a set of rules designed to...
Peer-reviewedThe use of different network security components, such as firewalls and network intrusi...
Most of the business services have been performing very effectively by using some of the evolving te...
Firewalls are core elements in networksecurity. However, managing firewall rules is anerror-prone ta...
Application firewalls are increasingly used to inspect upper-layer protocols (as HTTP) that are the ...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
Nowadays, there is a huge and growing concern about security in information and communication techno...
Firewalls are a widely deployed security mechanism to ensure the security of private networks in mos...