2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement 2009
DOI: 10.1109/ssiri.2009.52
|View full text |Cite
|
Sign up to set email alerts
|

Directed Acyclic Graph Modeling of Security Policies for Firewall Testing

Abstract: IntroductionFirewalls, which act as the most important defense mechanism of network security, have to be tested to validate that they work as specified. The firewall specification is mainly composed of intended security policy and allowed network protocols, which are usually the main focus of an attacker. The intended security policy consists of firewall rules, which configure the firewall behavior, and allowed network protocols. These constitute an important part of firewall's internal infrastructure which ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Model-based conformance testing by 11 involves experiments with the experiment size of 7 rules generating over 700 test cases taking about 3000 seconds, and 4 networks adding an additional 20,000 seconds. A test case generation tool presented in 12 indicates that the number of tests generated is a cross product of the number of individual sources, destinations, and services found in the rule set, suggesting a much higher complexity when using this brute force method. Furthermore, experiments in 13 show similar results when using a BDD as an internal representation of the policy, although the work was focused on model checking and not simulation.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Model-based conformance testing by 11 involves experiments with the experiment size of 7 rules generating over 700 test cases taking about 3000 seconds, and 4 networks adding an additional 20,000 seconds. A test case generation tool presented in 12 indicates that the number of tests generated is a cross product of the number of individual sources, destinations, and services found in the rule set, suggesting a much higher complexity when using this brute force method. Furthermore, experiments in 13 show similar results when using a BDD as an internal representation of the policy, although the work was focused on model checking and not simulation.…”
Section: Methodsmentioning
confidence: 99%
“…Frameworks capable of generating validation traffic for a particular firewall presented in several works 23,12 . In a similar manner to other topology mapping programs 24,25 , the work generates and sends actual traffic through the system, exercising a firewall's internal filtering to ensure consistency.…”
Section: Related Workmentioning
confidence: 99%
“…In a proposal for testing of security policies for firewalls, the security policies were represented as directed acyclic graphs (DAGs). Test cases represented each complete event sequence which could be derived from the DAG [27]. System testing and code-based coverage analysis employ similar testing methodologies.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, we use FDD [9] notion for modeling, whereas in our previous work [10], we used directed acyclic graph concept to deal with rule dependencies, which is implicitly handled by FDD. The present paper chooses FDD notation since formal, graph-theoretical notions and algorithms are utilized intensively with it.…”
Section: Related Workmentioning
confidence: 99%