Abstract
Firewalls are essential security devices that can provide protection against network attacks. To be effective, a firewall must be properly configured to ensure consistency with the security policy. However, configuring is a complex and error-prone process. This work tries to identify the reasons behind firewall misconfigurations. To achieve our goal, we conducted a series of semi-structured interviews with system administrators that manage access control lists in networks of different sizes. The paper discusses our interview results and describes future work.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bauer, L., Cranor, L.F., Reeder, R.W., Reiter, M.K., Vaniea, K.: Real life challenges in access-control management. In: CHI 2009. ACM (2009)
Chao, C.: A flexible and feasible anomaly diagnosis system for internet firewall rules. In: APNOMS 2011. IEEE (2011)
Galletta, A.: Mastering the Semi-Structured Interview and Beyond: From Research Design to Analysis and Publication (Qualitative Studies in Psychology). NYU Press (2013)
Wool, A.: A quantitative study of firewall configuration errors. Computer 37(6), 62–67 (2004)
Wool, A.: Trends in firewall configuration errors: Measuring the holes in swiss cheese. IEEE Internet Computing 14(4), 58–65 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Voronkov, A., Lindskog, S., Martucci, L.A. (2015). Challenges in Managing Firewalls. In: Buchegger, S., Dam, M. (eds) Secure IT Systems. NordSec 2015. Lecture Notes in Computer Science, vol 9417. Springer, Cham. https://doi.org/10.1007/978-3-319-26502-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-26502-5_13
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26501-8
Online ISBN: 978-3-319-26502-5
eBook Packages: Computer ScienceComputer Science (R0)