Automation the process of unifying the change in the firewall performance
1.INTRODUCTION
2.FIREWALL POLICY ANOMALIES
3.SYSTEM ARCHITECTURE AND DESIGN
A. Conflict management framework
B. Policy anomaly resolving and rule-ordering
C. Firewall log analysis
4. Authentication attack
5. Availability attack
6. Sql injection attack.
7. User log data gathering
9. References