Formal Network Models and Their Application to Firewall Policies
نویسندگان
چکیده
We present a formal model of network protocols and their application to modeling firewall policies. The formalization is based on the Unified Policy Framework (UPF). The formalization was originally developed with for generating test cases for testing the security configuration actual firewall and router (middle-boxes) using HOL-TestGen. Our work focuses on modeling application level protocols on top of tcp/ip.
منابع مشابه
Use of Formal models for the Firewall Policy Optimization
Firewalls are the core elements in network security & access control. A firewall controls the flow of traffic between different areas of your network. It uses a rule set called as firewall policy for this purpose. However as the size of rule set increases, specification and verification of the firewall rules becomes complicated and error-prone. This paper serves to provide an overview of the re...
متن کاملJRPIT 41.2.QXP:Layout 1
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application domains. For example, a Network Access Control policy might be configured in terms of firewall, proxy, intrusion prevention and user-access policies. While defined separately, these security policies may interoperate...
متن کاملAutomatic detection of firewall misconfigurations using firewall and network routing policies
Firewalls are the most prevalent and important means of enforcing security policies inside networks and across organizational boundaries. However, effective and fault free firewall management in large and fast growing networks becomes increasingly more challenging. Firewall security policies are complex and their interaction with routing policies and applications further complicates policy conf...
متن کاملFormal modelling and analysis of XML firewall for service-oriented systems
Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying user permissions and examining packet contents, conventional firewalls are not suitable for protecting service-oriented systems from unauthorised service invocations. In this paper, we present a formal XML firewall secur...
متن کاملFormal firewall conformance testing: an application of test and proof techniques
fo r yo ur pe rs on al us e. N ot fo r re di st rib ut io n. Th e de fin iti ve ve rs io n w as pu bl is he d in So ftw ar e Te st in g, Ve ri fic at io n & Re lia bi lit y (S TV R) ,p p. 1– 40 ,2 01 4. SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2014; 00:1–40 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/stvr Formal Firewall Co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Archive of Formal Proofs
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017