Test generation for network security rules

被引:0
|
作者
Laboratoire LSR-IMAG, BP 72, St Martin d’Hères [1 ]
38402, France
不详 [2 ]
38610, France
机构
来源
Lect. Notes Comput. Sci. | 2006年 / 341-356期
关键词
Computers - Testing - Artificial intelligence;
D O I
暂无
中图分类号
学科分类号
摘要
Checking that a security policy has been correctly deployed over a network is a key issue for system administrators. Since policies are usually expressed by rules, we propose a method to derive tests from a set of rules with a single modality. For each element of our language and each type of rule, we propose a pattern of test, which we call a tile. We then combine those tiles into a test for the whole rule. © IFIP International Federation for Information Processing 2006
引用
收藏
相关论文
共 50 条
  • [1] Test generation for network security rules
    Darmaillacq, Vianney
    Fernandez, Jean-Claude
    Groz, Roland
    Mounier, Laurent
    Richier, Jean-Luc
    TESTING OF COMMUNICATION SYSTEMS, PROCEEDINGS, 2006, 3964 : 341 - 356
  • [2] A Security Test Message Generation Algorithm of Diameter Protocol in the IMS Network
    Sun, Zhibo
    Xing, Wenhui
    Cui, Xiaoyan
    2015 2ND INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING AND INTERNET OF THINGS (DCIT), 2015, : 72 - 79
  • [3] Test Generation from Business Rules
    Jensen, Simon Holm
    Thummalapenta, Suresh
    Sinha, Saurabh
    Chandra, Satish
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2015,
  • [4] On Next Generation Network Security
    Kato, Nei
    IEEE NETWORK, 2017, 31 (02): : 2 - 2
  • [5] Network security analysis of weighted neural network with association rules mining
    Wang Ziqiao
    Fu Weinan
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 2102 - 2106
  • [6] Estimating computer network security scenarios with association rules
    Singha, Anjani Kumar
    Singh, Harsh Pratap
    Kundu, Shakti
    Tiwari, Pradeep Kumar
    Rajput, Ajeet Singh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 223 - 236
  • [7] Network Security Risk Assessment Based on Association Rules
    Cheng, Xiaorong
    Wei, Yan
    Geng, Xin
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1142 - 1145
  • [8] Study on Security of Next Generation Network
    Long Zhang
    Kai Zhao
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 538 - +
  • [9] Security Test Generation by Answer Set Programming
    Zech, Philipp
    Felderer, Michael
    Katt, Basel
    Breu, Ruth
    2014 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY, 2014, : 88 - 97
  • [10] Security Test Generation using Threat Trees
    Marback, Aaron
    Do, Hyunsook
    He, Ke
    Kondamarri, Samuel
    Xu, Dianxiang
    2009 ICSE WORKSHOP ON AUTOMATION OF SOFTWARE TEST, 2009, : 62 - 69