Firewall design and analysis:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
World Scientific
c2011
|
Schriftenreihe: | Computer and network security
v. 4 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Mode of access: World Wide Web Includes bibliographical references (p. 105-108) and index 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security |
Beschreibung: | 1 Online-Ressource (xi, 109 p.) |
ISBN: | 9789814261654 9789814261661 9814261653 9814261661 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043076649 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2011 |||| o||u| ||||||eng d | ||
020 | |a 9789814261654 |9 978-981-4261-65-4 | ||
020 | |a 9789814261661 |c electronic bk. |9 978-981-4261-66-1 | ||
020 | |a 9814261653 |9 981-4261-65-3 | ||
020 | |a 9814261661 |c electronic bk. |9 981-4261-66-1 | ||
035 | |a (OCoLC)742566319 | ||
035 | |a (DE-599)BVBBV043076649 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Liu, Alex X. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Firewall design and analysis |c Alex X. Liu |
264 | 1 | |a Singapore |b World Scientific |c c2011 | |
300 | |a 1 Online-Ressource (xi, 109 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Computer and network security |v v. 4 | |
500 | |a Mode of access: World Wide Web | ||
500 | |a Includes bibliographical references (p. 105-108) and index | ||
500 | |a 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions | ||
500 | |a This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Firewall |0 (DE-588)4386332-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Firewall |0 (DE-588)4386332-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=374805 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028500841 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=374805 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=374805 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175464775811072 |
---|---|
any_adam_object | |
author | Liu, Alex X. |
author_facet | Liu, Alex X. |
author_role | aut |
author_sort | Liu, Alex X. |
author_variant | a x l ax axl |
building | Verbundindex |
bvnumber | BV043076649 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)742566319 (DE-599)BVBBV043076649 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04443nmm a2200565zcb4500</leader><controlfield tag="001">BV043076649</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789814261654</subfield><subfield code="9">978-981-4261-65-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789814261661</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-981-4261-66-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9814261653</subfield><subfield code="9">981-4261-65-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9814261661</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">981-4261-66-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)742566319</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043076649</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Liu, Alex X.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Firewall design and analysis</subfield><subfield code="c">Alex X. Liu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">World Scientific</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 109 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Computer and network security</subfield><subfield code="v">v. 4</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 105-108) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=374805</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028500841</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=374805</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=374805</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043076649 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:43Z |
institution | BVB |
isbn | 9789814261654 9789814261661 9814261653 9814261661 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028500841 |
oclc_num | 742566319 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xi, 109 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | World Scientific |
record_format | marc |
series2 | Computer and network security |
spelling | Liu, Alex X. Verfasser aut Firewall design and analysis Alex X. Liu Singapore World Scientific c2011 1 Online-Ressource (xi, 109 p.) txt rdacontent c rdamedia cr rdacarrier Computer and network security v. 4 Mode of access: World Wide Web Includes bibliographical references (p. 105-108) and index 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Firewalls (Computer security) fast Firewalls (Computer security) Computer networks Security measures Firewall (DE-588)4386332-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Firewall (DE-588)4386332-2 s 1\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=374805 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Liu, Alex X. Firewall design and analysis COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Firewalls (Computer security) fast Firewalls (Computer security) Computer networks Security measures Firewall (DE-588)4386332-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4386332-2 (DE-588)4070085-9 |
title | Firewall design and analysis |
title_auth | Firewall design and analysis |
title_exact_search | Firewall design and analysis |
title_full | Firewall design and analysis Alex X. Liu |
title_fullStr | Firewall design and analysis Alex X. Liu |
title_full_unstemmed | Firewall design and analysis Alex X. Liu |
title_short | Firewall design and analysis |
title_sort | firewall design and analysis |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Firewalls (Computer security) fast Firewalls (Computer security) Computer networks Security measures Firewall (DE-588)4386332-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Firewalls (Computer security) Computer networks Security measures Firewall Rechnernetz |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=374805 |
work_keys_str_mv | AT liualexx firewalldesignandanalysis |