A Study to Hierarchical Visualization of Firewall Access Control Policies |
Kim, Tae-yong
(Korea Institute of Science and Technology Information(KISTI))
Kwon, Tae-woong (Korea Institute of Science and Technology Information(KISTI)) Lee, Jun (Korea Institute of Science and Technology Information(KISTI)) Lee, Youn-su (Korea Institute of Science and Technology Information(KISTI)) Song, Jung-suk (Korea Institute of Science and Technology Information(KISTI)) |
1 | Michael Cooney, "Network World 2020 State of the Network: SD-WAN, edge networking and security are hot", NetworkWorld, 14 Apr. 2020, IDG Communications, Inc. https://www.networkworld.com/article/3537559/state-of-the-network-sd-wan-edge-networking-and-security-issues-heat-things-up.html, Accessed 18 June 2020. |
2 | W. Stallings, "Network security essentials: applications and standards.", pp. 374-397, 2016. |
3 | E. S. Al-Shaer and H. H. Hamed, "Modeling and management of firewall policies." IEEE Transactions on network and service management 1.1, pp. 2-10, 2004. DOI |
4 | T. Tran and E. S. Al-Shaer, R. Boutaba, "PolicyVis: Firewall Security Policy Visualization and Inspection." LISA. Vol. 7. pp. 1-16, Nov. 2007. |
5 | E. S. Al-Shaer and H. H. Hamed, "Firewall policy advisor for anomaly discovery and rule editing." International Symposium on Integrated Network Management. Springer, Boston, pp. 17-30, Mar, 2003. |
6 | A. K. Meena and N. Hubballi, "NViZ: An Interactive Visualization of Network Security Systems Logs." 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, pp. 685-687, Jan, 2020. |
7 | Ui-Hyong Kim and Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim, Soon-Young Jung, "Practical firewall policy inspection using anomaly detection and its visualization." Multimedia tools and applications 71.2, pp. 627-641, 2014. DOI |
8 | F. Mansmann and T. Gobel, W. Cheswick, "Visual analysis of complex firewall configurations." Proceedings of the ninth international symposium on visualization for cyber security, pp. 1-8, 2012. |
9 | K. Ingham and S. Forrest, "A history and survey of network firewalls." University of New Mexico, Tech. Rep, 2002. |
10 | A. Wool, "Trends in firewall configuration errors: Measuring the holes in swiss cheese." IEEE Internet Computing 14.4, pp. 58-65, 2010. DOI |
11 | Y. Bartal and A. Mayer, K. Nissim, A. Wool, "Firmato: A novel firewall management toolkit." Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No. 99CB36344). IEEE, pp. 17-31, May, 1999. |
12 | Q. Duan, and E. S. Al-Shaer, "Traffic-aware dynamic firewall policy management: techniques and applications." IEEE Communications Magazine 51.7, pp. 73-79, 2013. DOI |
13 | H. Hu and G. J. Ahn, K. Kulkarni, "Detecting and resolving firewall policy anomalies." IEEE Transactions on dependable and secure computing 9.3, pp. 318-331, 2012. DOI |
14 | Paloalto Networks, PA-Series user manual, https://www.paloaltonetworks.co.kr/network-security/pa-series, Ac cessed 21 June 2020. |
15 | AhnLab, TrusGuard Firewalls, https://www.ahnlab.com/kr/site/product/productView.do?prodSeq=10, Accessed 24 June 2020. |
16 | Apache Tomcat, Tomcat 7.0.104 Software, http://tomcat.apache.org/, Accessed 23 June 2020. |
17 | MariaDB Foundation, MariaDB 10.3, https://mariadb.org/, Accessed 23 June 2020. |
18 | Likert, Rensis. "A technique for the measurement of attitudes." Archives of psychology (1932). |
19 | Redislabs, redis 6.0, https://redis.io/, Accessed 23 June 2020. |
20 | Unity Techinologies, Unity Core Platform, https://unity.com/, Accessed 23 June 2020. |
21 | SECUI, SECUI MF2, https://www.secui.com/product/mf2/, Accessed 25 June 2020. |
22 | Wins, Sniper NGFW, http://www.wins21.co.kr/product/product_030101.html?num=28/, Accessed 25 June 2020. |