Skip to main content

Natural vs. Technical Language Preference and Their Impact on Firewall Configuration

  • Conference paper
  • First Online:
HCI for Cybersecurity, Privacy and Trust (HCII 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12210))

Included in the following conference series:

  • 2899 Accesses

Abstract

Firewalls are network security components designed to regulate incoming and outgoing traffic to protect computers and networks. The behavior of firewalls is dictated by its configuration file, which is a written sequence of rules expressed by a set of keys and parameters. In this paper, we investigate whether certain representations of firewall rule sets can affect understandability. To collect data for our investigation, we designed an online survey for an audience who are familiar with firewalls, in which we aimed to compare two different rule set representations: iptables and English. We collected data from 56 participants. Our results show that participants’ perception of a certain rule set representation depends on their firewall expertise. Participants with basic or intermediate knowledge of firewalls consider rule sets expressed in English to be 40% easier to understand, whereas advanced or expert firewall users deemed it to be 27% more difficult. We will discuss the reasons for these results and describe their possible implications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The survey is available at https://survey.cs.kau.se/rulesets_comparison/.

  2. 2.

    https://github.com/diekmann/net-network.

  3. 3.

    https://www.reddit.com/.

  4. 4.

    https://www.reddit.com/r/sysadmin/.

  5. 5.

    https://www.reddit.com/r/networking.

  6. 6.

    https://www.reddit.com/r/netsec.

  7. 7.

    https://www.reddit.com/r/linux.

  8. 8.

    https://www.cisco.com/c/en/us/products/security/adaptive-security-appliance-asa-software/index.html.

References

  1. Bodei, C., Degano, P., Galletta, L., Focardi, R., Tempesta, M., Veronese, L.: Language-independent synthesis of firewall policies. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 92–106. IEEE (2018)

    Google Scholar 

  2. Burkhart, B.: Subreddit gender ratios (2017). http://bburky.com/subredditgenderratios/

  3. Connolly, J.H.: Context in the study of human languages and computer programming languages: a comparison. In: Akman, V., Bouquet, P., Thomason, R., Young, R. (eds.) CONTEXT 2001. LNCS, vol. 2116, pp. 116–128. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44607-9_9

    Chapter  MATH  Google Scholar 

  4. Crosby, M.E., Scholtz, J., Wiedenbeck, S.: The roles beacons play in comprehension for novice and expert programmers. In: PPIG, p. 5 (2002)

    Google Scholar 

  5. Field, A.: Discovering Statistics Using IBM SPSS Statistics. Sage, Thousand Oaks (2013)

    Google Scholar 

  6. Meek, G.E., Ozgur, C., Dunning, K.: Comparison of the t vs. Wilcoxon signed-rank test for Likert scale data and small samples. J. Mod. Appl. Stat. Methods 6(1), 10 (2007)

    Article  Google Scholar 

  7. Nanz, S., Torshizi, F., Pedroni, M., Meyer, B.: Design of an empirical study for comparing the usability of concurrent programming languages. Inf. Softw. Technol. 55(7), 1304–1315 (2013)

    Article  Google Scholar 

  8. Pozo, S., Varela-Vaca, A., Gasca, R.: AFPL2, an abstract language for firewall ACLs with NAT support. In: 2009 Second International Conference on Dependability, pp. 52–59. IEEE (2009)

    Google Scholar 

  9. Rosenthal, R., Cooper, H., Hedges, L.: Parametric measures of effect size. Handb. Res. Synthesis 621, 231–244 (1994)

    Google Scholar 

  10. Sattelberg, W.: The demographics of reddit: who uses the site? (2018). https://www.techjunkie.com/demographics-reddit/

  11. Svensk Författningssamling (SFS): Lag (2003:460) om etikprövning av forskning som avser människor [The Act concerning the Ethical Review of Research Involving Humans]. Utbildningsdepartementet, Stockholm, Sweden (2003)

    Google Scholar 

  12. Swedish Research Council (VR): Conducting ethical research (2018). https://www.vr.se/. Accessed 12 Dec 2019

  13. Voronkov, A., Iwaya, L.H., Martucci, L.A., Lindskog, S.: Systematic literature review on usability of firewall configuration. ACM Comput. Surv. 50(6), 1–35 (2017). https://doi.org/10.1145/3130876

    Article  Google Scholar 

  14. Voronkov, A., Martucci, L.A., Lindskog, S.: System administrators prefer command line interfaces, don’t they? An exploratory study of firewall interfaces. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (2019)

    Google Scholar 

  15. Voronkov, A., Martucci, L.A., Lindskog, S.: Measuring the usability of firewall rule sets. IEEE Access 8, 27106–27121 (2020). https://doi.org/10.1109/ACCESS.2020.2971093

    Article  Google Scholar 

  16. Wiedenbeck, S., Ramalingam, V., Sarasamma, S., Corritore, C.L.: A comparison of the comprehension of object-oriented and procedural programs by novice programmers. Interact. Comput. 11(3), 255–282 (1999)

    Article  Google Scholar 

  17. Wilcoxon, F.: Individual comparisons by ranking methods. Biometr. Bull. 1(6), 80–83 (1945). http://www.jstor.org/stable/3001968

    Article  Google Scholar 

  18. Wong, T.: On the usability of firewall configuration. In: Symposium on Usable Privacy and Security (2008)

    Google Scholar 

  19. Wool, A.: Trends in firewall configuration errors: measuring the holes in swiss cheese. IEEE Internet Comput. 14(4), 58–65 (2010)

    Article  Google Scholar 

  20. Zhang, B., Al-Shaer, E., Jagadeesan, R., Riely, J., Pitcher, C.: Specifications of a high-level conflict-free firewall policy language for multi-domain networks. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp. 185–194. ACM (2007)

    Google Scholar 

Download references

Acknowledgments

We are very grateful to everyone who participated in our survey. We would also like to thank the moderators of the Sysadmin (r/sysadmin), Networking (r/networking), Netsec (r/netsec), Linux (r/linux) subreddits for allowing us to reach out to their community.

This work was supported by the Knowledge Foundation of Sweden HITS project and by the Swedish Foundation for Strategic Research SURPRISE project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leonardo A. Martucci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Voronkov, A., Martucci, L.A. (2020). Natural vs. Technical Language Preference and Their Impact on Firewall Configuration. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2020. Lecture Notes in Computer Science(), vol 12210. Springer, Cham. https://doi.org/10.1007/978-3-030-50309-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-50309-3_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-50308-6

  • Online ISBN: 978-3-030-50309-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics