FWS: Analyzing, maintaining and transcompiling firewalls

2021 ◽  
Vol 29 (1) ◽  
pp. 77-134
Author(s):  
Chiara Bodei ◽  
Lorenzo Ceragioli ◽  
Pierpaolo Degano ◽  
Riccardo Focardi ◽  
Letterio Galletta ◽  
...  

Firewalls are essential for managing and protecting computer networks. They permit specifying which packets are allowed to enter a network, and also how these packets are modified by IP address translation and port redirection. Configuring a firewall is notoriously hard, and one of the reasons is that it requires using low level, hard to interpret, configuration languages. Equally difficult are policy maintenance and refactoring, as well as porting a configuration from one firewall system to another. To address these issues we introduce a pipeline that assists system administrators in checking if: (i) the intended security policy is actually implemented by a configuration; (ii) two configurations are equivalent; (iii) updates have the desired effect on the firewall behavior; (iv) there are useless or redundant rules; additionally, an administrator can (v) transcompile a configuration into an equivalent one in a different language; and (vi) maintain a configuration using a generic, declarative language that can be compiled into different target languages. The pipeline is based on IFCL, an intermediate firewall language equipped with a formal semantics, and it is implemented in an open source tool called FWS. In particular, the first stage decompiles real firewall configurations for iptables, ipfw, pf and (a subset of) Cisco IOS into IFCL. The second one transforms an IFCL configuration into a logical predicate and uses the Z3 solver to synthesize an abstract specification that succinctly represents the firewall behavior. System administrators can use FWS to analyze the firewall by posing SQL-like queries, and update the configuration to meet the desired security requirements. Finally, the last stage allows for maintaining a configuration by acting directly on its abstract specification and then compiling it to the chosen target language. Tests on real firewall configurations show that FWS can be fruitfully used in real-world scenarios.

Author(s):  
Ni Ketut Mirahayuni ◽  
Susie Chrismalia Garnida ◽  
Mateus Rudi Supsiadji

Abstract. Translating complex structures have always been a challenge for a translator since the structures can be densed with ideas and particular logical relations. The purpose of translation is reproducing texts into another language to make them available to wider readerships. Since language is not merely classification of a set of universal and general concept, that each language articulates or organizes the world differently, the concepts in one language can be radically different from another. One issue in translation is the difference among languages, that the wider gaps between the source and target languages may bring greater problems of transfer of message from the source into the target languages (Culler, 1976). Problematic factors involved in translation include meaning, style, proverbs, idioms and others. A number of translation procedures and strategies have been discussed to solve translation problems. This article presents analysis of complex structures in scientific Indonesian, the problems and effects on translation into English. The study involves data taken from two research article papers in Indonesian to be translated into English. The results of the analysis show seven (7) problems of Indonesian complex structures, whose effect on translation process can be grouped into two: complex structures related to grammar (including: complex structure with incomplete information, run-on sentences, redundancy , sentence elements with inequal semantic relation, and logical relation and choice of conjunctor) and complex structures related to information processing in discourse (including: front-weight- structure and thematic structure with changes of Theme element). Problems related to grammar may be solved with language economy and accuracy while those related to discourse may be solved with understanding information packaging patterns in the target language discourse. Keywords: scientific language, complex structures, translation


2017 ◽  
Vol 108 (1) ◽  
pp. 257-269 ◽  
Author(s):  
Nasser Zalmout ◽  
Nizar Habash

AbstractTokenization is very helpful for Statistical Machine Translation (SMT), especially when translating from morphologically rich languages. Typically, a single tokenization scheme is applied to the entire source-language text and regardless of the target language. In this paper, we evaluate the hypothesis that SMT performance may benefit from different tokenization schemes for different words within the same text, and also for different target languages. We apply this approach to Arabic as a source language, with five target languages of varying morphological complexity: English, French, Spanish, Russian and Chinese. Our results show that different target languages indeed require different source-language schemes; and a context-variable tokenization scheme can outperform a context-constant scheme with a statistically significant performance enhancement of about 1.4 BLEU points.


Literator ◽  
2018 ◽  
Vol 39 (1) ◽  
Author(s):  
Mthikazi Rose Masubelele

The meaning of words comes into play when words as units of translation are to be translated from one language into another. Lexical items that are extant in one language but not in others pose enormous problems for translators. The translation of ideophones – which feature very prominently in African discourse – is a case in point in this article. Translators faced with the translation of such forms are required to come up with strategies to aptly express their meanings in the target text. This article seeks to establish how CSZ Ntuli, in his English translation of an isiZulu short story Uthingo Lwenkosazana by DBZ Ntuli, has translated some of the ideophones used by the original author. Translation strategies used by CSZ Ntuli in his translation to express the meanings of the isiZulu ideophones will be brought to light in this article. It will be confirmed that CSZ Ntuli, using different lexical forms in the target language, has effectively changed unfamiliar isiZulu cultural notions to concepts that the English target reader can relate to. It will also be shown that the meanings of the isiZulu ideophones can be expressed in the target language using approximation and amplification as translation strategies provided that the translator has a good command of both source and target languages. The discussion will also look at how various translation scholars view the notion of equivalence at word level, and research on ideophones in isiZulu will also be reviewed.


Author(s):  
Prashant Kumar Patra ◽  
Padma Lochan Pradhan

The access control is a mechanism that a system grants, revoke the right to access the object. The subject and object can able to integrate, synchronize, communicate and optimize through read, write and execute over a UFS. The access control mechanism is the process of mediating each and every request to system resources, application and data maintained by a operating system and determining whether the request should be approve, created, granted or denied as per top management policy. The AC mechanism, management and decision is enforced by implementing regulations established by a security policy. The management has to investigate the basic concepts behind access control design and enforcement, point out different security requirements that may need to be taken into consideration. The authors have to formulate and implement several ACM on normalizing and optimizing them step by step, that have been highlighted in proposed model for development and production purpose. This research paper contributes to the development of an optimization model that aims and objective to determine the optimal cost, time and maximize the quality of services to be invested into security model and mechanisms deciding on the measure components of UFS. This model has to apply to ACM utilities over a Web portal server on object oriented and distributed environment. This ACM will be resolve the uncertainty, un-order, un formal and unset up (U^4) problems of web portal on right time and right place of any where & any time in around the globe. It will be more measurable and accountable for performance, fault tolerance, throughput, bench marking and risk assessment on any application.


Author(s):  
Prashant Kumar Patra ◽  
Padma Lochan Pradhan

The access control is a mechanism that a system grants, revoke the right to access the object. The subject and object can able to integrate, synchronize, communicate and optimize through read, write and execute over a UFS. The access control mechanism is the process of mediating each and every request to system resources, application and data maintained by a operating system and determining whether the request should be approve, created, granted or denied as per top management policy. The AC mechanism, management and decision is enforced by implementing regulations established by a security policy. The management has to investigate the basic concepts behind access control design and enforcement, point out different security requirements that may need to be taken into consideration. The authors have to formulate and implement several ACM on normalizing and optimizing them step by step, that have been highlighted in proposed model for development and production purpose. This research paper contributes to the development of an optimization model that aims and objective to determine the optimal cost, time and maximize the quality of services to be invested into security model and mechanisms deciding on the measure components of UFS. This model has to apply to ACM utilities over a Web portal server on object oriented and distributed environment. This ACM will be resolve the uncertainty, un-order, un formal and unset up (U^4) problems of web portal on right time and right place of any where & any time in around the globe. It will be more measurable and accountable for performance, fault tolerance, throughput, bench marking and risk assessment on any application.


2020 ◽  
Vol 34 (05) ◽  
pp. 9274-9281
Author(s):  
Qianhui Wu ◽  
Zijia Lin ◽  
Guoxin Wang ◽  
Hui Chen ◽  
Börje F. Karlsson ◽  
...  

For languages with no annotated resources, transferring knowledge from rich-resource languages is an effective solution for named entity recognition (NER). While all existing methods directly transfer from source-learned model to a target language, in this paper, we propose to fine-tune the learned model with a few similar examples given a test case, which could benefit the prediction by leveraging the structural and semantic information conveyed in such similar examples. To this end, we present a meta-learning algorithm to find a good model parameter initialization that could fast adapt to the given test case and propose to construct multiple pseudo-NER tasks for meta-training by computing sentence similarities. To further improve the model's generalization ability across different languages, we introduce a masking scheme and augment the loss function with an additional maximum term during meta-training. We conduct extensive experiments on cross-lingual named entity recognition with minimal resources over five target languages. The results show that our approach significantly outperforms existing state-of-the-art methods across the board.


1998 ◽  
Vol 20 (3) ◽  
pp. 423-424
Author(s):  
Kathleen Bardovi-Harlig

Imagine a three-year longitudinal study of the acquisition of multiple target languages by learners of different language backgrounds. It may sound like an idealized example from a research-methods lecture, but it is the actual design of the European Science Foundation inquiry into adult second language acquisition and the latest report released by Benjamins, a substantial revision of Volume 5 of the final report on temporality (Bhardwaj, Dietrich, & Noyau, 1988). This volume reports on the acquisition of temporality in five target languages (English, German, Dutch, French, and Swedish) by 21 learners of six source languages (Punjabi, Italian, Turkish, Arabic, Spanish, and Finnish) with learners from two source languages for each target language. The volume has eight chapters written by the main authors and cooperating contributors: “Introduction” (Dietrich & Perdue), “Frame of Analysis” (Klein), five chapters on the acquisition of temporality by target language—English (Klein), German (Dietrich), Dutch (Klein, Coenen, van Helvert, & Hendricks), French (Noyau, Houdaïfa, Vasseur, & Véronique), and Swedish (Noyau, Dorriots, Sjöström, & Voionmaa)—and “Conclusions” (Klein, Dietrich, & Noyau).


Author(s):  
M. Koch ◽  
F. Parisi-Presicce ◽  
K. Pauls

Security requirements have become an integral part of most modern software systems. In order to produce secure systems, it is necessary to provide software engineers with the appropriate systematic support. This chapter discusses a methodology to integrate the speci?cation of access control policies into UML. The methodology, along with the graph-based formal semantics for the UML access control speci?ca-tion, allows to reason about the coherence of the access control speci?cation. The chapter also presents a procedure to modify policy rules to guarantee the satisfaction of constraints, and shows how to generate access control requirements from UML diagrams. The main concepts in the UML access control speci?cation are illustrated with an example access control model for distributed object systems.


Sign in / Sign up

Export Citation Format

Share Document