|
[1].C.H. Liao, C.S. Chao, “An ARAR Tree-Based Diagnosis System for Rule Anomalies Optimization System,” Feng Chia University Department of Communications Engineering, Feng Chia University,2016. [2].D. Rovniagin, A. Wool, “The geometric efficient matching algorithm for firewalls,” IEEE Transactions on Dependable and Secure Computing, Vol. 8, Is. 1, pp. 147-159, 2011. [3].Ehab Al-Shaer, Hazem Hamed, “Modeling and Management of Firewall Policies,” IEEE Transactions on Network and Service Management, Vol: 1-1,2004. [4].E. Al-Shaer, H. Hamed, R.Boutaba and M. Hasan,“Conflict Classification and Analysis of Distributed Firewall Policies,” IEEE Journal on Selected Areas in Communications, Vol. 23, Is. 10, pp. 2069-2084,2005. [5].E. Horowitz, S. Sahni and S. Anderson-Freed, “Fundamentals of data structures in C, ” 2nd ed. Summit, NJ: Silicon Press,2008. [6].Holland, John H., “Adaptation in Natural and Artificial Systems,” the MIT Press, Cambridge,1992. [7].H.Y. Lin, C.S. Chao, “An Efficient Anomaly Diagnostic Mechanism for Stateful Firewall Rules,” Feng Chia University Department of Communications Engineering, Feng Chia University,2018. [8].Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama and Naohisa Takahashi, “Topological Approach to Detect Conflicts in Firewall Policies, ” International Workshop on Security in Systems and Networks, Proc. of 23rd IEEE International Parallel and Distributed Processing Symposium, SSN-1569173665- paper-3.pdf,2009. [9].Yi Yin, R. S. Bhuvaneswaran, Yoshiaki Katayama, and Naohisa Takahashi, “Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA,” ICICS 2005, LNCS3783, Beijing, pp. 467–480. [10].Yi Yin, Yoshiaki Katayama and Naohisa Takahashi, “Detection of Conflicts Caused by a Combinations of Filters Based on Spatial Relationships,” IPSJ Journal, Sep 2008, Vol.49, pp. 3121-3135.
|