Skip to Main Content
One of the most critical aspects of security problems is the impossibility of accurately checking a system real weaknesses. In a complex and distributed environment this problem is greatly accentuated. During the process of configuration and implementation of the network security policies errors can occur, resulting in holes in security and, consequently, compromising the entire system functionality. These errors are often very hard to detect by performing a manual or visual inspection. For this reason, automatic management of this phase is required. Here we propose an algorithm to automatically tune up the configurations of the network devices in order to avoid unexpected and unwanted network behaviours. This algorithm will be described in all its phases and some results of the software implementation will be shown.