Test generation for network security rules

被引:0
|
作者
Laboratoire LSR-IMAG, BP 72, St Martin d’Hères [1 ]
38402, France
不详 [2 ]
38610, France
机构
来源
Lect. Notes Comput. Sci. | 2006年 / 341-356期
关键词
Computers - Testing - Artificial intelligence;
D O I
暂无
中图分类号
学科分类号
摘要
Checking that a security policy has been correctly deployed over a network is a key issue for system administrators. Since policies are usually expressed by rules, we propose a method to derive tests from a set of rules with a single modality. For each element of our language and each type of rule, we propose a pattern of test, which we call a tile. We then combine those tiles into a test for the whole rule. © IFIP International Federation for Information Processing 2006
引用
收藏
相关论文
共 50 条
  • [21] Can the Generation of Test Cases for Unit Testing be Automated with Rules?
    Nalepa, Grzegorz J.
    Kutt, Krzysztof
    Kaczor, Krzysztof
    ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, ICAISC 2014, PT II, 2014, 8468 : 536 - 547
  • [22] Complete analysis of configuration rules to guarantee reliable network security policies
    Alfaro, J. G.
    Boulahia-Cuppens, N.
    Cuppens, F.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 103 - 122
  • [23] Complete analysis of configuration rules to guarantee reliable network security policies
    J. G. Alfaro
    N. Boulahia-Cuppens
    F. Cuppens
    International Journal of Information Security, 2008, 7 : 103 - 122
  • [24] Prediction of Computer Network Security Situation Based on Association Rules Mining
    Xue, Rixin
    Tang, Peng
    Fang, Shudong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [25] Maximizing Test Coverage for Security Threats Using Optimal Test Data Generation
    Hussain, Talha
    Faiz, Rizwan Bin
    Aljaidi, Mohammad
    Khattak, Adnan
    Samara, Ghassan
    Alsarhan, Ayoub
    Alazaidah, Raed
    APPLIED SCIENCES-BASEL, 2023, 13 (14):
  • [26] Spatial representation of the effect of new generation on network security
    Grijalva, S
    Visnesky, AM
    2004 IEEE PES POWER SYSTEMS CONFERENCE & EXPOSITION, VOLS 1 - 3, 2004, : 144 - 149
  • [27] Network Security Management (NSM) focused on Dispersed Generation
    Hammons, Tom
    Styczynski, Zbigniew
    2008 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, VOLS 1-11, 2008, : 2337 - 2343
  • [28] RESEARCH OF SECURITY METRIC ARCHITECTURE FOR NEXT GENERATION NETWORK
    Huang, Rui
    Yan, Danfeng
    Yang, Fangchun
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 207 - 212
  • [29] Research on attack graph generation for network security situation
    Wang, Yanbo
    Wang, Huiqiang
    Zhao, Chao
    Zhang, Yushu
    Yu, Ming
    Advances in Intelligent Systems and Computing, 2013, 212 : 1147 - 1154
  • [30] Network security and digital forensics in next generation communications
    Park, Jong Hyuk
    Gritzalis, Stefanos
    Jin, Hai
    Wang, Jenlong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 143 - 145