Application firewalls are increasingly used to inspect upper-layer protocols (as HTTP) that are the target or vehicle of several attacks and are not properly addressed by network firewalls. Like other security controls, application firewalls need to be carefully configured, as errors have a significant impact on service security and availability. However, currently no technique is available to analyze their configuration for correctness and consistency. This paper extends a previous model for analysis of packet filters to the policy anomaly analysis in application firewalls. Both rule-pair and multirule anomalies are detected, hence reducing the likelihood of conflicting and suboptimal configurations. The expressiveness of this model has been successfully tested against the features of Squid, a popular Web caching proxy offering various access control capabilities. The tool implementing this model has been tested on various scenarios and exhibits good performance.
|Titolo:||Analysis of application-layer filtering policies with application to HTTP|
|Data di pubblicazione:||2015|
|Digital Object Identifier (DOI):||http://dx.doi.org/10.1109/TNET.2013.2293625|
|Appare nelle tipologie:||1.1 Articolo in rivista|
File in questo prodotto:
|torsec_ieee_ton_2015.pdf||2a Post-print versione editoriale / Version of Record||Non Pubblico - Accesso privato/ristretto||Administrator Richiedi una copia|
|torsec_tnet_application_firewall_policies.pdf||2. Post-print / Author's Accepted Manuscript||PUBBLICO - Tutti i diritti riservati||Visibile a tuttiVisualizza/Apri|