Abstract
Although most companies operate a firewall to protect their information assets, they have difficulties in identifying the control conditions of firewalls. This study proposes an analysis tool to visualize segment-based firewall rules to facilitate verification of the current control conditions. The proposed visualization tool analyzes the current control conditions of packets automatically, thereby eliminating the need for manual inspection as before, and displays the conditions with a visualization model to allow them to be easily verified. This enables managers to perform fast and accurate verification to assess whether packets are allowed or denied. This present study involved implementing the proposed visualization tool, and simulations were conducted to verify that the proposed approach was achievable. The present study also included conducting interviews with firewall experts whose feedback was positive. A video of the proposed visualization tool can be found on the following web site: https://youtu.be/q4HMnBvXbk.
| Original language | English |
|---|---|
| Title of host publication | 2017 IEEE Symposium on Visualization for Cyber Security, VizSec 2017 |
| Editors | Celeste Lyn Paul, Simon Walton, Sophie Engle, Diane Staheli, Lane Harrison, Nicolas Prigent, Robert Gove |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 1-8 |
| Number of pages | 8 |
| ISBN (Electronic) | 9781538626931 |
| DOIs | |
| Publication status | Published - 2017 Oct 6 |
| Event | 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017 - Phoenix, United States Duration: 2017 Oct 2 → … |
Publication series
| Name | 2017 IEEE Symposium on Visualization for Cyber Security, VizSec 2017 |
|---|---|
| Volume | 2017-October |
Other
| Other | 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017 |
|---|---|
| Country/Territory | United States |
| City | Phoenix |
| Period | 17/10/2 → … |
Bibliographical note
Funding Information:This work was supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No.2017-0-00213, Development of Cyber Self Mutation Technologies for Proactive Cyber Defense)
Publisher Copyright:
© 2017 IEEE.
Copyright:
Copyright 2018 Elsevier B.V., All rights reserved.
Keywords
- D.1.7 [Software]: PROGRAMMING TECHNIQUES-Visual Programming
- K.6.5 [Management of Computing and Information Systems]: Security and Protection-Unauthorized access (e.g., hacking, phreaking)
ASJC Scopus subject areas
- Computer Networks and Communications
- Computer Vision and Pattern Recognition