Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "adabbe6f-6e98-4c4e-8512-3e3943446b07"}, "_deposit": {"id": "4387", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4387"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4387", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Classification and Discovery on Intra-Firewall Policy Anomalies", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Firewalls are core elements in networksecurity. However, managing firewall rules is anerror-prone task especially for less experienceadministrator. The reason is that firewall filteringrules itself might cause network vulnerability due tothe firewall policy anomalies unless carefully writtenand ordered them. Thus, firewall rule analysis isessential to determine the proper rule placement andordering without any policy anomalies wheninserting or modifying filtering rules. In this thesis,we develop a firewall rules analyzer based on IntraFirewall Policy Anomaly Algorithm in order todiscover and alert all possible policy anomalies inIPCOP firewall that is used in Small Office HomeOffice (SOHO) network. And the main purpose of thisanalyzer is to assist the administrators who settingtheir firewall to be able to configure conflict-freefirewall rules easily by giving advising alerts. Weimplemented the firewall in a small campus networkprototype and experimented it in a virtual networkthat is built by using Virtual Machine Software(VMWare) Workstation 10. Firewall policy for thissystem is based on our own predefined securitypolicy for this network. We will test the system thathow the developed analyzer can assist theadministrators by comparing of the administrator\u0027sability for firewall setting with the help of theanalyzer and those without the help of it."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Firewall"}, {"interim": "ACL"}, {"interim": "Rules"}, {"interim": "Anomaly"}, {"interim": "Firewall Policy"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-10-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "NJPSC 2019 Proceedings-pages-235-242.pdf", "filesize": [{"value": "522 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 522000.0, "url": {"url": "https://meral.edu.mm/record/4387/files/NJPSC 2019 Proceedings-pages-235-242.pdf"}, "version_id": "e7867a6e-5208-43b5-bccf-101e559227f4"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "National Journal of Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thwin, Lae Win"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2323"}, "item_title": "Classification and Discovery on Intra-Firewall Policy Anomalies", "item_type_id": "21", "owner": "1", "path": ["1597824304333"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004387", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-10-15"}, "publish_date": "2019-10-15", "publish_status": "0", "recid": "4387", "relation": {}, "relation_version_is_last": true, "title": ["Classification and Discovery on Intra-Firewall Policy Anomalies"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Journals

Classification and Discovery on Intra-Firewall Policy Anomalies

http://hdl.handle.net/20.500.12678/0000004387
http://hdl.handle.net/20.500.12678/0000004387
6d0496de-c3ab-40db-9d4c-265ee1b419ec
adabbe6f-6e98-4c4e-8512-3e3943446b07
None
Preview
Name / File License Actions
NJPSC NJPSC 2019 Proceedings-pages-235-242.pdf (522 Kb)
Publication type
Article
Upload type
Publication
Title
Title Classification and Discovery on Intra-Firewall Policy Anomalies
Language en_US
Publication date 2019-03
Authors
Thwin, Lae Win
Aye, Zin May
Description
Firewalls are core elements in networksecurity. However, managing firewall rules is anerror-prone task especially for less experienceadministrator. The reason is that firewall filteringrules itself might cause network vulnerability due tothe firewall policy anomalies unless carefully writtenand ordered them. Thus, firewall rule analysis isessential to determine the proper rule placement andordering without any policy anomalies wheninserting or modifying filtering rules. In this thesis,we develop a firewall rules analyzer based on IntraFirewall Policy Anomaly Algorithm in order todiscover and alert all possible policy anomalies inIPCOP firewall that is used in Small Office HomeOffice (SOHO) network. And the main purpose of thisanalyzer is to assist the administrators who settingtheir firewall to be able to configure conflict-freefirewall rules easily by giving advising alerts. Weimplemented the firewall in a small campus networkprototype and experimented it in a virtual networkthat is built by using Virtual Machine Software(VMWare) Workstation 10. Firewall policy for thissystem is based on our own predefined securitypolicy for this network. We will test the system thathow the developed analyzer can assist theadministrators by comparing of the administrator'sability for firewall setting with the help of theanalyzer and those without the help of it.
Keywords
Firewall, ACL, Rules, Anomaly, Firewall Policy
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2323
Journal articles
National Journal of Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:39:05.514650
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL