TY - GEN
T1 - An Efficient Method for Ontology-Based Multi-Vendor Firewall Misconfiguration Detection
T2 - 9th IEEE ANDESCON, ANDESCON 2018
AU - Cordova, Ruben F.
AU - Marcovich, Armando L.
AU - Santivanez, Cesar A.
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/12/5
Y1 - 2018/12/5
N2 - Large enterprises employ a variety of firewalls, possibly from different vendors each with its own rule syntax. Furthermore, enterprise policy may be mapped to hundreds of rules on each device. Manual configuration of a large set of rules is a complex process that may result in misconfigurations and the resulting in security vulnerabilities. A promising alternative is the use of semantic web technologies (an ontology combined with a query language or reasoner) to detect firewall misconfigurations. However, a poorly designed ontology may result in excessive memory consumption and processing load, rendering the method ineffective. In this paper, we present an efficient ontology design for detecting misconfigurations on firewall rules, that attempts to reduce the computing resources needed to validate the firewall rules of the companys policies. The design was tested on a realworld scenario of an enterprise with equipment from 3 different vendors: Fortinet, Cisco ASA, and Checkpoint. Our solution was able to detect over a hundred misconfigured rules. Finally, an evaluation of the impact of the chosen combination of ontology, query language, and reasoner on the computational cost is also presented.
AB - Large enterprises employ a variety of firewalls, possibly from different vendors each with its own rule syntax. Furthermore, enterprise policy may be mapped to hundreds of rules on each device. Manual configuration of a large set of rules is a complex process that may result in misconfigurations and the resulting in security vulnerabilities. A promising alternative is the use of semantic web technologies (an ontology combined with a query language or reasoner) to detect firewall misconfigurations. However, a poorly designed ontology may result in excessive memory consumption and processing load, rendering the method ineffective. In this paper, we present an efficient ontology design for detecting misconfigurations on firewall rules, that attempts to reduce the computing resources needed to validate the firewall rules of the companys policies. The design was tested on a realworld scenario of an enterprise with equipment from 3 different vendors: Fortinet, Cisco ASA, and Checkpoint. Our solution was able to detect over a hundred misconfigured rules. Finally, an evaluation of the impact of the chosen combination of ontology, query language, and reasoner on the computational cost is also presented.
KW - anomaly detection
KW - Firewall management
KW - misconfigured rules
KW - ontology
KW - semantic web
UR - http://www.scopus.com/inward/record.url?scp=85060380165&partnerID=8YFLogxK
U2 - 10.1109/ANDESCON.2018.8564655
DO - 10.1109/ANDESCON.2018.8564655
M3 - Conference contribution
AN - SCOPUS:85060380165
T3 - 2018 IEEE ANDESCON, ANDESCON 2018 - Conference Proceedings
BT - 2018 IEEE ANDESCON, ANDESCON 2018 - Conference Proceedings
A2 - Callejas, Jose David Cely
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 22 August 2018 through 24 August 2018
ER -