Here is an annotated bibliography on software firewalls:
1. Cheng, Peter C., et al. "Understanding firewall policy rules using graph mining." IEEE/ACM Transactions on Networking 25.6 (2017): 3807-3821.
This article presents a graph-based approach to analyze and understand firewall policy rules. It models firewall rules as a directed graph and applies graph mining techniques like clustering to analyze relationships between rules. This helps identify redundant rules, detect conflicts, and better understand the overall firewall policy. The approach was evaluated on real-world firewall rulesets.
2. Al-Shaer, Ehab S., and Hamed H. Hamed. "Discovery of policy anomalies in distributed