Automatic Completeness Checks of Network Device Infrastructure Configurations During Enterprise Information Technology Transformation

作者: Nancy Burchfield , Rafah A. Hosn , Nathaniel Hang , James Murray , HariGovind V. Ramasamy

DOI:

关键词: Firewall (construction)Data flow diagramInformation technologyReal-time computingMultiple dataNetworking hardwareDatabaseCompleteness (statistics)Computer science

摘要: A system and an article of manufacture for automatically determining configuration completeness during information technology (IT) transformation from a pre-transformation source environment to post-transformation target include obtaining record each multiple data flows in environment, transforming flow the transformed that corresponds is covered by firewall one or more interfaces environment.

参考文章(28)
Frank Stratton, Cheuk To Law, Thomas Wilsher, System and method for managing a computing cluster ,(2013)
A.A. Hassan, Algorithms for verifying firewall and router access lists midwest symposium on circuits and systems. ,vol. 1, pp. 512- 515 ,(2003) , 10.1109/MWSCAS.2003.1562330
Jeffrey G. Lawson, Evan Cooke, Keith A. Davidson, Bulat Shakirzyanov, System and method for managing a computing cluster ,(2012)
E.S. Al-Shaer, H.H. Hamed, Management and translation of filtering security policies international conference on communications. ,vol. 1, pp. 256- 260 ,(2003) , 10.1109/ICC.2003.1204180
Ehab S. Al-Shaer, Hazem H. Hamed, Firewall Policy Advisor for anomaly discovery and rule editing integrated network management. pp. 17- 30 ,(2003) , 10.1007/978-0-387-35674-7_2
Patrick J. MeLampy, Robert F. Penfield, Stephen E. Norton, Ephraim W. Dobbins, System and method for providing rapid rerouting of real-time multi-media flows ,(2001)
Igor Kotenko, Olga Polubelova, None, Verification of security policy filtering rules by Model Checking Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems. ,vol. 2, pp. 706- 710 ,(2011) , 10.1109/IDAACS.2011.6072862
K. Golnabi, R.K. Min, L. Khan, E. Al-Shaer, Analysis of Firewall Policy Rules Using Data Mining Techniques network operations and management symposium. pp. 305- 315 ,(2006) , 10.1109/NOMS.2006.1687561