Research Article
An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration
452 downloads
@INPROCEEDINGS{10.1007/978-3-642-37949-9_47, author={Pritom Rajkhowa and Shyamanta Hazarika and Guillermo Simari}, title={An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration}, proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers}, proceedings_a={QSHINE}, year={2013}, month={7}, keywords={Defeasible Logic Programming stateless firewall stateful firewall anomaly argumentation}, doi={10.1007/978-3-642-37949-9_47} }
- Pritom Rajkhowa
Shyamanta Hazarika
Guillermo Simari
Year: 2013
An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration
QSHINE
Springer
DOI: 10.1007/978-3-642-37949-9_47
Abstract
Firewalls are the frontier defense in network security. Firewalls provide a set of rules that identify how to handle individual data packets arriving at the network. Firewall configuration is increasingly becoming difficult. Filter properties called hint at possible conflicts between rules. An argumentation framework could provide ways of handling such conflicts. Verification of a firewall involve finding out whether anomalies exist or not. Reconfiguration involves removing critical anomalies discovered in the verification phase. In this paper, we show how a Defeasible Logic Programming approach with an underlying argumentation based semantics could be applied for verification and reconfiguration of a firewall.
Copyright © 2013–2024 ICST