Remind that an anomaly in a security policy of a firewall is
defined as the existence of two or more filtering rules matching
the same packet. From this basic definition, and as noted
in [16], several related work has categorized different types of
firewall policy anomalies [17], [7], [18]. On the basis of theses
classifications, typically encountered firewall policy anomalies
types were defined and which are: shadowing, generalization,
correlation and redundancy. A complete study of anomaly
detection by our automata-based approach is our objective in
a near future. Nevertheless, we propose here to illustrate how
our automata-based modeling approach can be used to: