透過您的圖書館登入
IP:3.141.24.134
  • 學位論文

網路防火牆規則驗證之研究

A Study of Firewalls Rules Verification

指導教授 : 梁德昭

摘要


近年來資料被駭客竊取事件層出不窮,防火牆乃是網路安全中重要的環節之一,負責篩選不必要的網路連線來保護組織內部網路。防火牆過濾封包的機制是透過存取控制清單(Access Control List; ACL)內紀錄的規則做決定,當有兩條或是兩條以上的規則符合過濾條件,以優先權較大的規則做為執行動作,故對於存取控制清單內的規則、規則的順序與存取控制清單的部署都必須要小心謹慎。當防火牆過濾規則產生了非預期的行為,本文將會造成此現象的規則稱為異常規則(Anomaly Rule)。本論文的目標是在知道多防火牆間網路拓樸的狀況下,透過抽象防火牆模型,將網路拓樸中的各個防火牆轉化成對應的抽象防火牆(Abstract Firewall; AFW),再將各個抽象防火牆經由循序路徑驗證及平行路徑驗證,去驗證多防火牆間的規則是否有異常規則存在,若存在異常規則,通知網路管理人員修改,修改完成後即為代表此網路拓樸的抽象防火牆。藉由此抽象防火牆作為中介,讓網管人員可以透過此抽象防火牆檢驗防火牆網路的正確性。

並列摘要


In recent years, data theft by hackers continuously occurrence. Firewall is an important part of network security, it is responsible for filtering unnecessary network connections to protect organization's internal network.Firewall mechanism for filtering packets is through the records rules in the ACL to make a decision.Firewall mechanism for filtering packets is through the records rules in the ACL to make a decision.therefore, the rules in the ACL and the rules order and the ACL deployment all must have to be careful. Unexpected behavior when the firewall filtering rules, in this article we call the rule as Anomaly Rule.The goal of this paper is in knowing the multi-firewalls under the condition of network topology, by the abstract firewall model, we transforms each firewall in network topology to the correspondence abstract firewall (AFW), then each AFW by way of sequential path validation and parallel path validation to verify rules between multi-firewalls whether there exists anomaly rules, if exists anomaly rules,notify the network administrators to modify, after the modification is completed, it's represent the AFW of this network topology. By this AFW as an intermediary, enabling the network administrators to go through this AFW to ckeck accuracy of firewalls network.

並列關鍵字

Firewall Abstract Firewall Anomaly

參考文獻


[1] Al-Shaer E., and Hamed, H., “Discovery of Policy Anomalies in Distributed Firewalls,” Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, Vol. 4, pp. 2605 - 2616, 2004.
[4] Bryant, R. E., "Graph-Based Algorithms for Boolean Function Manipulation", IEEE Transactions on Computers, vol. c-35, no.8, 1986
[5] Bryant, R., ‘Symbolic Boolean Manipulation with Ordered Binary-Decision Diagrams’. ACM Com-puting Surveys, 24(3):293–318, September 1992
[7] Liu, A., "Firewall Policy Verification and Troubleshooting," Computer Networks, Vol. 53, Is. 16, pp. 2800-2809, 2009.
[8] Rezvani, M., Aryan, R., "Analyzing and Resolving Anomalies in Firewall Security Policies based on Propositional logic," IEEE 13th International Multitopic Conference, pp. 1-7, 14-15 Dec. 2009

延伸閱讀