Firewall Monitoring

Authors

  • Ernst L. Leiss Department of Computer Science, University of Houston
  • Jianyu You NEC Systems Laboratory, Irving, Texas

DOI:

https://doi.org/10.19153/cleiej.1.1.4

Abstract

Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks, firewalls are utilized since they restrict network access while letting legitimate users have unencumbered access. Firewalls are also used to log security auditing information about connections and operations. We describe a monitor database gateway (MDBG) designed and implemented to replace older forms of firewall logging by a database system. SQL commands can be used to retrieve logged information instead of ad hoc scripts. The database application al- lows secure access from other components of a firewall through the Ker- beros authentication as well as other authentication methods. If the underlying database changes, only a small portion of the MDBG must be modified; the code for the other components of the firewall remains un- affected.

Downloads

Published

1998-06-01