Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration

Download
429 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_47,
        author={Pritom Rajkhowa and Shyamanta Hazarika and Guillermo Simari},
        title={An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={Defeasible Logic Programming stateless firewall stateful firewall anomaly argumentation},
        doi={10.1007/978-3-642-37949-9_47}
    }
    
  • Pritom Rajkhowa
    Shyamanta Hazarika
    Guillermo Simari
    Year: 2013
    An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_47
Pritom Rajkhowa1,*, Shyamanta Hazarika1,*, Guillermo Simari2,*
  • 1: Tezpur University
  • 2: Universidad Nacional del Sur
*Contact email: pritomr@tezu.ernet.in, smh@tezu.ernet.in, grs@cs.uns.edu.ar

Abstract

Firewalls are the frontier defense in network security. Firewalls provide a set of rules that identify how to handle individual data packets arriving at the network. Firewall configuration is increasingly becoming difficult. Filter properties called hint at possible conflicts between rules. An argumentation framework could provide ways of handling such conflicts. Verification of a firewall involve finding out whether anomalies exist or not. Reconfiguration involves removing critical anomalies discovered in the verification phase. In this paper, we show how a Defeasible Logic Programming approach with an underlying argumentation based semantics could be applied for verification and reconfiguration of a firewall.