Ahmed Bouhoula

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In our days, firewalls are widely deployed to secure both hosts and networks against attacks and unwanted data flows. They control incoming and outgoing packets based on filtering rules' lists which reflect the desired security policy. Therefore, filtering rules must be coherent, well edited and free from anomalies and mainly on the case of distributed(More)
Legacy work on correcting firewall anomalies operate with the premise of creating totally disjunctive rules. Unfortunately, such solutions are impractical from implementation point of view as they lead to an explosion of the number of firewall rules. In a related previous work, we proposed a new approach for performing assisted corrective actions, which in(More)
  • 1