Test generation for network security rules

被引:0
|
作者
Laboratoire LSR-IMAG, BP 72, St Martin d’Hères [1 ]
38402, France
不详 [2 ]
38610, France
机构
来源
Lect. Notes Comput. Sci. | 2006年 / 341-356期
关键词
Computers - Testing - Artificial intelligence;
D O I
暂无
中图分类号
学科分类号
摘要
Checking that a security policy has been correctly deployed over a network is a key issue for system administrators. Since policies are usually expressed by rules, we propose a method to derive tests from a set of rules with a single modality. For each element of our language and each type of rule, we propose a pattern of test, which we call a tile. We then combine those tiles into a test for the whole rule. © IFIP International Federation for Information Processing 2006
引用
收藏
相关论文
共 50 条
  • [31] Building next-generation network security processors
    Davis, S
    Roberts, M
    ELECTRONIC ENGINEERING, 2000, 72 (884): : 95 - +
  • [32] Security for the core network of third generation mobile systems
    Horn, G
    Kröselberg, D
    Pütz, S
    Schmitz, R
    COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 297 - 312
  • [33] Automatic Generation of Extended Dependency Graphs for Network Security
    Guenther, Heiko
    Jahnke, Marko
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 136 - 139
  • [34] Network Security Considerations for a New Generation Protocol UDT
    Bernardo, Danilo Valeros
    Hoang, Doan
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 125 - 130
  • [35] Special issue on next generation communication and network security
    Shon, Taeshik
    Lambrinoudakis, Costas
    Zhou, Xiaobo
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (10) : 1083 - 1085
  • [36] Experiments and countermeasures of security vulnerabilities on next generation network
    Kim, Jeong-Wook
    Cho, Hyug-Hyun
    Mun, Gil-Jong
    Seo, Jae-Hyun
    Noh, Bong-Nam
    Kim, Yong-Min
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 562 - +
  • [37] Attack Graph Generation with Machine Learning for Network Security
    Koo, Kijong
    Moon, Daesung
    Huh, Jun-Ho
    Jung, Se-Hoon
    Lee, Hansung
    ELECTRONICS, 2022, 11 (09)
  • [38] A test calculus framework applied to network security policies
    Falcone, Ylies
    Fernandez, Jean-Claude
    Mounier, Laurent
    Richier, Jean-Luc
    FORMAL APPROACHES TO SOFTWARE TESTING AND RUNTIME VERIFICATION, 2006, 4262 : 55 - +
  • [39] Security Rules versus Security Properties
    Jaume, Mathieu
    INFORMATION SYSTEMS SECURITY, 2010, 6503 : 231 - 245
  • [40] Test generation by Lagrange programming neural network
    Nagamatu, M
    Yanaru, T
    1998 SECOND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED INTELLIGENT ELECTRONIC SYSTEMS, KES'98 PROCEEDINGS, VOL 1, 1998, : 341 - 347