{"created":"2020-09-01T14:39:01.422736+00:00","id":4387,"links":{},"metadata":{"_buckets":{"deposit":"adabbe6f-6e98-4c4e-8512-3e3943446b07"},"_deposit":{"id":"4387","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4387"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4387","sets":["1582963302567:1597824304333"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Classification and Discovery on Intra-Firewall Policy Anomalies","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Firewalls are core elements in networksecurity. However, managing firewall rules is anerror-prone task especially for less experienceadministrator. The reason is that firewall filteringrules itself might cause network vulnerability due tothe firewall policy anomalies unless carefully writtenand ordered them. Thus, firewall rule analysis isessential to determine the proper rule placement andordering without any policy anomalies wheninserting or modifying filtering rules. In this thesis,we develop a firewall rules analyzer based on IntraFirewall Policy Anomaly Algorithm in order todiscover and alert all possible policy anomalies inIPCOP firewall that is used in Small Office HomeOffice (SOHO) network. And the main purpose of thisanalyzer is to assist the administrators who settingtheir firewall to be able to configure conflict-freefirewall rules easily by giving advising alerts. Weimplemented the firewall in a small campus networkprototype and experimented it in a virtual networkthat is built by using Virtual Machine Software(VMWare) Workstation 10. Firewall policy for thissystem is based on our own predefined securitypolicy for this network. We will test the system thathow the developed analyzer can assist theadministrators by comparing of the administrator'sability for firewall setting with the help of theanalyzer and those without the help of it."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Firewall"},{"interim":"ACL"},{"interim":"Rules"},{"interim":"Anomaly"},{"interim":"Firewall Policy"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-10-15"}],"displaytype":"preview","filename":"NJPSC 2019 Proceedings-pages-235-242.pdf","filesize":[{"value":"522 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4387/files/NJPSC 2019 Proceedings-pages-235-242.pdf"},"version_id":"e7867a6e-5208-43b5-bccf-101e559227f4"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"National Journal of Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thwin, Lae Win"},{"subitem_authors_fullname":"Aye, Zin May"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2019-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2323"},"item_title":"Classification and Discovery on Intra-Firewall Policy Anomalies","item_type_id":"21","owner":"1","path":["1597824304333"],"publish_date":"2019-10-15","publish_status":"0","recid":"4387","relation_version_is_last":true,"title":["Classification and Discovery on Intra-Firewall Policy Anomalies"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:48:11.986516+00:00"}