Firewall design and analysis /

Saved in:
Bibliographic Details
Author / Creator:Liu, Alex X.
Imprint:Singapore ; Hackensack, NJ : World Scientific, ©2011.
Description:1 online resource (xi, 109 pages) : illustrations.
Language:English
Series:Series in computer and network security ; v. 4
Computer and network security ; v. 4.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11098879
Hidden Bibliographic Details
ISBN:9789814261661
9814261661
9789814261654
9814261653
Notes:Includes bibliographical references (pages 105-108) and index.
Print version record.
Summary:This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.
Other form:Print version: Liu, Alex X. Firewall design and analysis. Singapore : World Scientific, ©2011 9789814261654
Table of Contents:
  • 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book
  • 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design
  • 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results
  • 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties
  • 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results
  • 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results
  • 7. Epilogue. 7.1. Conclusions.