The Policy Distribution Algorithm of Firewall in Integrated Security Management


The KIPS Transactions:PartC, Vol. 9, No. 4, pp. 467-472, Aug. 2002
10.3745/KIPSTC.2002.9.4.467,   PDF Download:

Abstract

Recently, Networks are required to adopt the security system and security consulting because of security threats and vulnerabilities of systems. Enterprise Security Management (ESM) is a system which establishes the security zone composed of security systems and Firewalls and applies the security policy to each security system. A relevant ESM is based on the effective policy and the proper security system. Particularly, multiple firewalls in ESM are concerned with the security policy about each traffic. In this paper, we describe the problems that can be occurred when we select the firewalls to apply security policy of access control in ESM composed of multiple firewalls and propose the FALCON algorithm, which is able to select the firewalls to apply the policy. We expect that FALCON algorithm offers stability, scalability and compactness for selecting firewall set.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. H. Kim, Y. J. Kwon, D. S. Kim, T. M. Chung, "The Policy Distribution Algorithm of Firewall in Integrated Security Management," The KIPS Transactions:PartC, vol. 9, no. 4, pp. 467-472, 2002. DOI: 10.3745/KIPSTC.2002.9.4.467.

[ACM Style]
Kwang H. Kim, Yun J. Kwon, Dong S. Kim, and Tai M. Chung. 2002. The Policy Distribution Algorithm of Firewall in Integrated Security Management. The KIPS Transactions:PartC, 9, 4, (2002), 467-472. DOI: 10.3745/KIPSTC.2002.9.4.467.