Detecting and Resolving
Firewall Policy Anomalies
ABSTRACT:
The advent of emerging computing
technologies such as service-oriented architecture and cloud computing has
enabled us to perform business services more efficiently and effectively.
However, we still suffer from unintended security leakages by unauthorized
actions in business services. Firewalls are the most widely deployed security
mechanism to ensure the security of private networks in most businesses and
institutions. The effectiveness of security protection provided by a firewall
mainly depends on the quality of policy configured in the firewall.
Unfortunately, designing and managing firewall policies are often error prone
due to the complex nature of firewall configurations as well as the lack of
systematic analysis mechanisms and tools. In this paper, we represent an
innovative policy anomaly management framework for firewalls, adopting a
rule-based segmentation technique to identify policy anomalies and derive
effective anomaly resolutions. In particular, we articulate a grid-based
representation technique, providing an intuitive cognitive sense about policy
anomaly. We also discuss a proof-of-concept implementation of a
visualization-based firewall policy analysis tool called Firewall Anomaly
Management Environment (FAME). In addition, we demonstrate how efficiently our approach
can discover and resolve anomalies in firewall policies through rigorous
experiments.
ARCHITECTURE:
AIM:
To
provide an innovative policy anomaly management framework for firewalls,
adopting a rule-based segmentation technique to identify policy anomalies and
derive effective anomaly resolutions.
SYNOPSIS:
A
novel anomaly management framework for firewalls based on a rule-based
segmentation technique to facilitate not only more accurate anomaly detection
but also effective anomaly resolution. Based on this technique, a network
packet space defined by a firewall policy can be divided into a set of disjoint
packet space segments. Each segment associated with a unique set of firewall
rules accurately indicates an overlap relation among those rules. We also
introduce a flexible conflict resolution method to enable a fine grained
conflict resolution with the help of several effective resolution strategies
with respect to the risk assessment of protected networks and the intention of
policy definition.
EXISTING
SYSTEM:
Firewall policy management is a
challenging task due to the complexity and interdependency of policy rules.
This is further exacerbated by the continuous evolution of network and system
environments.
The process of configuring a firewall is
tedious and error prone. Therefore, effective mechanisms and tools for policy management
are crucial to the success of firewalls.
Existing policy analysis tools, such as
Firewall Policy Advisor and FIREMAN, with the goal of detecting policy
anomalies have been introduced. Firewall Policy Advisor only has the capability
of detecting pair wise anomalies in firewall rules. FIREMAN can detect anomalies
among multiple rules by analyzing the relationships between one rule and the
collections of packet spaces derived from all preceding rules.
However, FIREMAN also has limitations in
detecting anomalies. For each firewall rule, FIREMAN only examines all
preceding rules but ignores all subsequent rules when performing anomaly analysis.
In addition, each analysis result from FIREMAN can only show that there is a misconfiguration
between one rule and its preceding rules, but cannot accurately indicate all rules
involved in an anomaly.
DISADVANTAGES
OF EXISTING SYSTEM:
Fireman can detect anomalies among
multiple rules by analyzing the relationships between one rule and the
collections of packet spaces derived from all preceding rules. For each firewall
rule, FIREMAN only examines all preceding rules but ignores all subsequent
rules when performing anomaly analysis.
PROPOSED
SYSTEM:
In this paper, we represent a novel
anomaly management framework for firewalls based on a rule-based segmentation technique
to facilitate not only more accurate anomaly detection but also effective
anomaly resolution.
Based on this technique, a network
packet space defined by a firewall policy can be divided into a set of disjoint
packet space segments. Each segment associated with a unique set of firewall
rules accurately indicates an overlap relation (either conflicting or redundant)
among those rules.
We also introduce a flexible conflict
resolution method to enable a fine-grained conflict resolution with the help of
several effective resolution strategies with respect to the risk assessment of
protected networks and the intention of policy definition.
ADVANTAGES OF PROPOSED SYSTEM:
In
our framework conflict detection and resolution, conflicting segments are
identified in the first step. Each conflicting segment associates with a policy
conflict and a set of conflicting rules. Also, the correlation relationships
among conflicting segments are identified and conflict correlation groups are
derived. Policy conflicts belonging to different conflict correlation groups
can be resolved separately, thus the searching space for resolving conflicts is
reduced by the correlation process.
MODULES:
·
Correlation
of Packet Space Segment
·
Action
Constraint Generation
·
Rule
Reordering
·
Data
Package
Correlation
of Packet Space Segment:
The
major benefit of generating correlation groups for the anomaly analysis is that
anomalies can be examined within each group independently, because all
correlation groups are independent of each other. Especially, the searching
space for reordering conflicting rules in conflict resolution can be
significantly lessened and the efficiency of resolving conflicts can be greatly
improved.
Action
Constraint Generation:
In
a firewall policy are discovered and conflict correlation groups are
identified, the risk assessment for conflicts is performed. The risk levels of
conflicts are in turn utilized for both automated and manual strategy
selections. A basic idea of automated strategy selection is that a risk level
of a conflicting segment is used to directly determine the expected action
taken for the network packets in the conflicting segment. If the risk level is
very high, the expected action should deny packets considering the protection
of network perimeters
Rule
Reordering:
The
solution for conflict resolution is that all action constraints for conflicting
segments can be satisfied by reordering conflicting rules. In conflicting rules
in order that satisfies all action constraints, this order must be the optimal
solution for the conflict resolution.
Data
Package:
When
conflicts in a policy are resolved, the risk value of the resolved policy
should be reduced and the availability of protected network should be improved
comparing with the situation prior to conflict resolution based on the
threshold value data will be received in to the server.
SYSTEM CONFIGURATION:-
H/W SYSTEM CONFIGURATION:-
ü Processor -Pentium –III
ü Speed - 1.1 Ghz
ü RAM - 256 MB(min)
ü Hard
Disk - 20 GB
ü Floppy
Drive - 1.44 MB
ü Key
Board - Standard Windows Keyboard
ü Mouse - Two or Three Button Mouse
ü Monitor - SVGA
S/W System Configuration:-
v Operating System : Windows95/98/2000/XP
v Front End : Java
REFERENCE:
Hongxin Hu, Student Member, IEEE, Gail-Joon
Ahn, Senior Member, IEEE, and Ketan Kulkarni,” Detecting and Resolving Firewall
Policy Anomalies”, IEEE TRANSACTIONS ON
DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012.