Specification Modeling and Validation Applied to Network Security Gateways

نویسنده

  • Robert J. Hall
چکیده

A network security gateway protects the computers of a home or small office from Internet-based attacks by remote adversaries. It allows all the protected machines to share a single connection to the Internet and may allow secure access, via a VPN tunnel, into a remote corporate network. It may provide other services as well. Because its main job is security, it is critical to have high confidence that it meets its requirements. This is only partially obtainable through testing, because while testing can check that expected behaviors occur, attackers may exploit unexpected behaviors. Therefore, I am exploring tools and techniques for applying more sophisticated tools to validating the implementations of these devices. The primary difficulties are a lack of detailed knowledge of the behavior of standard platform components (such as the Linux operating system) and, of course, incompleteness in known requirements of the overall system. In this presentation, I will demonstrate how I use executable specification modeling and lightweight formal methods tools to help discover, validate, and refine requirements models. This process iteratively constructs a formal, executable model of (an abstraction of) the implementation and validates behaviors and properties, while suggesting experiments to perform on the implementation to reduce ignorance. The tool suite used is the Interactive Specification Acquisition Tools (ISAT) reactive system design suite[2].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Validation of Security Policies

Security Policies constitute the core of network protection infrastructures. However, their development is a sensitive task because it can be in opposition with the security requirements (e.g. lack of rule or conflicting rules). A specification task seems to be indispensible in order to clarify the desired exigencies. A validation process for security policies becomes then necessary before thei...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

Artificial Neural Network Modeling for Predicting of some Ion Concentrations in the Karaj River

The water quality of the Karaj River was studied through collecting 2137 experimental data set gained by 20 sampling stations. The data included different parameters such as T (temperature), pH, NTU (turbidity), hardness, TDS (total dissolved solids), EC (electrical conductivity) and basic anion, cation concentrations. In this study a multi-layer perceptron artificial neural network model was d...

متن کامل

Modeling of Compressive Strength of Metakaolin Based Geopolymers by The Use of Artificial Neural Network RESEARCH NOTE)

In order to study the effect of R2O/Al2O3 (where R=Na or K), SiO2/Al2O3, Na2O/K2O and H2O/R2O molar ratios on the compressive strength (CS) of Metakaolin base geopolymers, more than forty data were gathered from literature. To increase the number of data, some experiments were also designed. The resulted data were utilized to train and test the three layer artificial neural network (ANN). Bayes...

متن کامل

Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary core network in assigning network address prefixes to gateways in mobile ad-hoc networks. This paper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001