T. Abbes, A. Bouhoula, and M. Rusinowitch, An inference system for detecting firewall filtering rules anomalies, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.2122-2128, 2008.
DOI : 10.1145/1363686.1364197

URL : https://hal.archives-ouvertes.fr/inria-00329730

E. Shaer and H. Hamed, Modeling and Management of Firewall Policies, IEEE Transactions on Network and Service Management, vol.1, issue.1, pp.2-10, 2004.
DOI : 10.1109/TNSM.2004.4623689

E. Shaer and H. Hamed, Taxonomy of conflicts in network security policies, IEEE Communications Magazine, vol.44, issue.3, pp.134-141, 2006.

E. S. and H. H. Hamed, Firewall policy advisor for anomaly discovery and rule editing, Proceedings of IFIP/IEEE Eighth International Symposium on Integrated Network Management, pp.17-30, 2003.

E. S. and H. H. Hamed, Discovery of policy anomalies in distributed firewalls, Proceedings of IEEE INFOCOMM, pp.2605-2616, 2004.

J. G. Alfaro, N. Cuppens-boulahia, and F. Cuppens, Complete analysis of configuration rules to guarantee reliable network security policies, International Journal of Information Security, vol.29, issue.2, pp.103-122, 2008.
DOI : 10.1007/s10207-007-0045-7

URL : https://hal.archives-ouvertes.fr/hal-01207771

F. Baboescu and G. Varghese, Fast and scalable conflict detection for packet classifiers, Proceedings of the 10th IEEE International Conference on Network Protocols, ICNP '02, pp.270-279, 2002.

C. Basile, A. Cappadonia, and A. Lioy, Network-Level Access Control Policy Analysis and Transformation, IEEE/ACM Transactions on Networking, vol.20, issue.4, pp.985-998, 2012.
DOI : 10.1109/TNET.2011.2178431

N. Benyoussef and A. Bouhoula, Automatic conformance verification of distributed firewalls to security requirements, Proceedings of the 2010 IEEE Second International Conference on Social Computing, SOCIALCOM '10, pp.834-841, 2010.

N. Benyoussef, A. Bouhoula, and F. Jacquemard, Automatic verification of conformance of firewall configurations to security policies, Proceedings of the 14th IEEE Symposium on Computers and Communications, pp.526-531, 2009.

. Cert-coordination and . Center, Conficker worm targets microsoft windows systems, 2003.

S. Consulting, Trojan list sorted on trojan port

D. Eppstein and S. Muthukrishnan, Internet packet filter management and rectangle geometry, Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, pp.827-835, 2001.

P. Eronen and J. Zitting, An expert system for analyzing firewall rules, Proceedings of the 6th Nordic Workshop on Secure IT Systems, pp.100-107, 2001.

N. Cuppens-boulahia, F. Cuppens, and J. G. Alfaro, Detection and removal of firewall misconfiguration, Proceedings of the International Conference on Communication , Network and Information Security, IASTED'05, pp.154-162, 2005.

N. Cuppens-boulahia, F. Cuppens, and J. G. Alfaro, Misconfiguration management of network security components, Proceedings of the 7th International Symposium on System and Information Security, pp.154-162, 2005.

S. Ferraresi, S. Pesic, L. Trazza, and A. Baiocchi, Automatic Conflict Analysis and Resolution of Traffic Filtering Policy for Firewall and Security Gateway, 2007 IEEE International Conference on Communications, pp.1304-1310, 2007.
DOI : 10.1109/ICC.2007.220

J. Garcia-alfaro, F. Cuppens, N. Cuppens-boulahia, and S. Preda, MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies, Proceedings of the 5th international Workshop on data privacy management , and 3rd international conference on Autonomous spontaneous security, pp.203-215, 2011.
DOI : 10.1109/2.485845

URL : https://hal.archives-ouvertes.fr/hal-00623634

M. Gouda and A. Liu, A Model of Stateful Firewalls and Its Properties, 2005 International Conference on Dependable Systems and Networks (DSN'05), pp.128-137, 2005.
DOI : 10.1109/DSN.2005.9

M. Gouda and X. Liu, Firewall design: consistency, completeness, and compactness, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., pp.320-327, 2004.
DOI : 10.1109/ICDCS.2004.1281597

P. Gupta and N. Mckeown, Algorithms for packet classification, IEEE Network, vol.15, issue.2, pp.24-32, 2001.
DOI : 10.1109/65.912717

H. Hu, G. Ahn, and K. Kulkarn, Detecting and Resolving Firewall Policy Anomalies, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.3, pp.318-331, 2012.
DOI : 10.1109/TDSC.2012.20

A. Jeffreyand and T. Samak, Model checking firewall policy configurations, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY '09, pp.60-67, 2009.

A. Lui and M. Gouda, Firewall policy queries, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.6, pp.766-777, 2009.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford et al., The spread of the sapphire/slammer worm, 2003.

J. Qian, ACLA: A Framework for Access Control List (ACL) Analysis and Optimization, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century, p.4, 2001.
DOI : 10.1007/978-0-387-35413-2_18

M. Rezvani and R. Aryan, Analyzing and resolving anomalies in firewall security policies based on propositional logic, 2009 IEEE 13th International Multitopic Conference, pp.1-7, 2009.
DOI : 10.1109/INMIC.2009.5383125

A. D. Rubin, D. Geer, and M. J. Ranum, Web Security Sourcebook, EDPACS, vol.25, issue.8, 1997.
DOI : 10.1201/1079/43236.25.8.19980201/30191.7

M. A. Ruiz-sanchez and E. W. , Biersack and W. Dabbous Survey and taxonomy of IP address lookup algorithms, Journal IEEE Network: The Magazine of Global Internetworking, pp.8-23, 2001.

V. Srinivasan, V. , and G. , Fast address lookups using controlled prefix expansion, ACM Transactions on Computer Systems, vol.17, issue.1, pp.1-40, 1999.
DOI : 10.1145/296502.296503

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.3830

S. Thanasegaran, Y. Yin, Y. Tateiwa, Y. Katayama, and N. Takahashi, A topological approach to detect conflicts in firewall policies, 2009 IEEE International Symposium on Parallel & Distributed Processing, pp.1-7, 2009.
DOI : 10.1109/IPDPS.2009.5161245

L. Yuan, J. Mai, Z. Su, H. Chen, C. Chuah et al., Fireman: A toolkit for firewall modeling and analysis, Proceedings of the IEEE Symposium on Security and Privacy, SP '06, pp.199-213, 2006.