Offline firewall analysis

  title={Offline firewall analysis},
  author={Alain J. Mayer and Avishai Wool and Elisha Ziskind},
  journal={International Journal of Information Security},
Practically every corporation that is connected to the Internet has at least one firewall, and often many more. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. Therefore, testing, auditing, or reverse-engineering existing firewall configurations are important components of every corporation’s network security practice. Unfortunately, this is easier said than done. Firewall configuration files are written in notoriously hard to… CONTINUE READING
Highly Cited
This paper has 53 citations. REVIEW CITATIONS
32 Citations
27 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 32 extracted citations

53 Citations

Citations per Year
Semantic Scholar estimates that this publication has 53 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 27 references

Essential Checkpoint Firewall-1: An Installation, Configuration, and Troubleshooting Guide

  • D. D. Welch-Abernathy
  • AddisonWesley, Reading, MA
  • 2002
Highly Influential
20 Excerpts

Cisco Secure PIX Firewalls

  • D. W. Chapman, A. Fox
  • Cisco Press, Indiana
  • 2001
Highly Influential
15 Excerpts

Cisco Access Lists

  • G. Held, K. Hundley
  • McGraw-Hill, New York
  • 1999
Highly Influential
16 Excerpts

Firewall product overview

  • C. Fulmer
  • 2002
1 Excerpt

Similar Papers

Loading similar papers…