100 likes | 206 Views
AUTOMATED FIREWALL RULE SET GENERATION THROUGH PASSIVE TRAFFIC INSPECTION. Georg-Christian Pranschke Supervisor: Barry Irwin Security and Networks Research Group
E N D
AUTOMATED FIREWALL RULE SET GENERATIONTHROUGH PASSIVE TRAFFIC INSPECTION Georg-Christian Pranschke Supervisor: Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University
Background Wireshark Tcpdump / Windump ACM Classification System (1998) C.2.0. Security and Protection • Introducing firewalls into existing networks is often problematic • Production traffic cannot be interrupted • Necessitates time consuming manual analysis of network traffic • Ever increasing traffic volumes make manual analysis less feasible AUTOMATED FIREWALL RULE SET GENERATION
Traffic Analyser – Flow Creation AUTOMATED FIREWALL RULE SET GENERATION
High Level Design Overview – System Components AUTOMATED FIREWALL RULE SET GENERATION
Charybdis screencast Scylla screencast
Results / Critical Evaluation AUTOMATED FIREWALL RULE SET GENERATION • Misconfigured firewall provides only the illusion of network security • Imperfect information -> no proof of correctness • “Dancing bears” • HTTP universal firewall traversal protocol -> SQLi
Questions ? AUTOMATED FIREWALL RULE SET GENERATION