Firmato:: A novel firewall management toolkit

被引:75
作者
Bartal, Y [1 ]
Mayer, A
Nissim, K
Wool, A
机构
[1] Hebrew Univ Jerusalem, Sch Engn & Comp Sci, IL-91904 Jerusalem, Israel
[2] CenterRun Inc, Redwood City, CA 94065 USA
[3] Microsoft Res, SVC, Mountain View, CA 94043 USA
[4] Tel Aviv Univ, Sch Elect Engn, IL-69978 Tel Aviv, Israel
来源
ACM TRANSACTIONS ON COMPUTER SYSTEMS | 2004年 / 22卷 / 04期
关键词
management; security; languages; security policy; model definition language; visualization; firewall management;
D O I
10.1145/1035582.1035583
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years packet-filtering firewalls have seen some impressive technological advances (e.g., stateful inspection, transparency, performance, etc.) and wide-spread deployment. In contrast, firewall and security management technology is lacking. In this paper we present Firmato, a firewall management toolkit, with the following distinguishing properties and components: (1) an entity-relationship model containing, in a unified form, global knowledge of the security policy and of the network topology; (2) a model definition language, which we use as an interface to define an instance of the entity-relationship model; (3) a model compiler, translating the global knowledge of the model into firewall-specific configuration files; and (4) a graphical firewall rule illustrator. We implemented a prototype of our toolkit to work with several commercially available firewall products. This prototype was used to control an operational firewall for several months. We believe that our approach is an important step toward streamlining the process of configuring and managing firewalls, especially in complex, multi-firewall installations.
引用
收藏
页码:381 / 420
页数:40
相关论文
共 33 条
[1]  
Ahuja RK, 1993, NETWORK FLOWS THEORY
[2]  
[Anonymous], CISCO SECURE PIX FIR
[3]  
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theoryof NP-Completeness
[4]   Firmato:: A novel firewall management toolkit [J].
Bartal, Y ;
Mayer, A ;
Nissim, K ;
Wool, A .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :17-31
[5]  
Bellovin S., 1999, LOGIN LOGIN, P39
[6]  
Carney M, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P1
[7]  
Chapman D., 1995, Building internet firewalls
[8]  
Cheswick WR., 2003, FIREWALLS INTERNET S
[9]  
*FWB, 2002, FIR BUILD
[10]   A TECHNIQUE FOR DRAWING DIRECTED-GRAPHS [J].
GANSNER, ER ;
KOUTSOFIOS, E ;
NORTH, SC ;
VO, KP .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1993, 19 (03) :214-230