2014 IEEE Symposium on Computers and Communications (ISCC) 2014
DOI: 10.1109/iscc.2014.6912478
|View full text |Cite
|
Sign up to set email alerts
|

A formal framework for verifying inter-firewalls consistency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…In the field of firewall configuration and policies, current approaches to model based verification and validation include work by Brucker et al [18], who provide a formal model of stateful and stateless firewalls, and a framework that tests actual firewalls using that model. Moussa et al formalize the process of verifying consistency among a set of firewalls with a global security policy [9]. Adão et al [19] present a tool for converting abstract firewall models into concrete configurations for the Netfilter networking framework in Linux.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the field of firewall configuration and policies, current approaches to model based verification and validation include work by Brucker et al [18], who provide a formal model of stateful and stateless firewalls, and a framework that tests actual firewalls using that model. Moussa et al formalize the process of verifying consistency among a set of firewalls with a global security policy [9]. Adão et al [19] present a tool for converting abstract firewall models into concrete configurations for the Netfilter networking framework in Linux.…”
Section: Related Workmentioning
confidence: 99%
“…We explore the use of a model based approach for detection of configuration errors in the planning and design phase. The verification and validation of network configurations has been studied extensively [4,5,6,7,8,9]. However, previous work either does not provide a methodology for identifying and specifying rules, or describe how the corresponding rule violation error messages are generated to help environment designers.…”
Section: Introductionmentioning
confidence: 99%
“…Authors in [15] use the concept of Relational Algebra and a 2D box model to identify anomalies. Also, there are research works focusing on creating automated solutions to detect configuration inconsistencies firewalls through formal verification [4], [9]. In [5], Gawanmeh et al presented a formal model for firewall configuration rules based on domain restriction.…”
Section: Introductionmentioning
confidence: 99%