The Policy Distribution Algorithm of Firewall in Integrated Security Management 


Vol. 9,  No. 4, pp. 467-472, Aug.  2002
10.3745/KIPSTC.2002.9.4.467


PDF
  Abstract

Recently, Networks are required to adopt the security system and security consulting because of security threats and vulnerabilities of systems. Enterprise Security Management (ESM) is a system which establishes the security zone composed of security systems and Firewalls and applies the security policy to each security system. A relevant ESM is based on the effective policy and the proper security system. Particularly, multiple firewalls in ESM are concerned with the security policy about each traffic. In this paper, we describe the problems that can be occurred when we select the firewalls to apply security policy of access control in ESM composed of multiple firewalls and propose the FALCON algorithm, which is able to select the firewalls to apply the policy. We expect that FALCON algorithm offers stability, scalability and compactness for selecting firewall set.

  Statistics


  Cite this article

[IEEE Style]

K. H. Kim, Y. J. Kwon, D. S. Kim, T. M. Chung, "The Policy Distribution Algorithm of Firewall in Integrated Security Management," The KIPS Transactions:PartC, vol. 9, no. 4, pp. 467-472, 2002. DOI: 10.3745/KIPSTC.2002.9.4.467.

[ACM Style]

Kwang H. Kim, Yun J. Kwon, Dong S. Kim, and Tai M. Chung. 2002. The Policy Distribution Algorithm of Firewall in Integrated Security Management. The KIPS Transactions:PartC, 9, 4, (2002), 467-472. DOI: 10.3745/KIPSTC.2002.9.4.467.