作者: V. Santiraveewan , Y. Permpoontanalarp
DOI: 10.1109/AINA.2004.1283792
关键词:
摘要: Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to ensure the protections is difficult task. The main reason lack of methodology analyze security firewall configurations. IP spoofing attack an in which attacker can impersonate another person towards victim. We propose new verifying vulnerability configurations synthesizing spoofing-free Our based on graph theory, provides simple intuitive approach analysis attack.