A quantitative study of firewall configuration errors

@article{Wool2004AQS,
  title={A quantitative study of firewall configuration errors},
  author={Avishai Wool},
  journal={Computer},
  year={2004},
  volume={37},
  pages={62-67}
}
The protection that firewalls provide is only as good as the policy they are configured to implement. Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines. Firewalls are the cornerstone of corporate intranet security. Once a company acquires a firewall, a systems administrator must configure and manage it according to a security policy that meets the company's needs. Configuration is a crucial task… CONTINUE READING
Highly Influential
This paper has highly influenced 30 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 403 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 262 extracted citations

Taxonomy of quality metrics for assessing assurance of security correctness

Software Quality Journal • 2011
View 5 Excerpts
Highly Influenced

Abnormal Policy Detection and Correction Using Overlapping Transition

IEICE Transactions • 2010
View 4 Excerpts
Highly Influenced

Applying Trusted Network Technology To Process Control Systems

Critical Infrastructure Protection • 2008
View 5 Excerpts
Highly Influenced

404 Citations

02040'06'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 404 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 10 references

Aug

Symantec Security, Response
W32.Welchia.Worm • 2003

The Spread of the Sapphire/ Slammer Worm

D Moore
The Spread of the Sapphire/ Slammer Worm • 2003

The Twenty Most Critical Internet Security Vulnerabilities

Sans Institute
The Twenty Most Critical Internet Security Vulnerabilities • 2003

Fang: A Firewall Analysis Engine

IEEE Symposium on Security and Privacy • 2000

CERT Advisory CA- 2003-20: W32/Blaster Worm

Cert Coordination Center
CERT Advisory CA- 2003-20: W32/Blaster Worm

Similar Papers

Loading similar papers…