A Rule Relation Calculus for Verification and Validation of Firewalls

被引:0
|
作者
Kalita, Shobhanjana [1 ]
Hazarika, Shyamanta M. [1 ]
机构
[1] Tezpur Univ, Sch Engn, Tezpur, Assam, India
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Rule based filter is a set of ordered filtering rules. Each rule is formed of a condition and an action. Condition is a set of network fields and can be seen as points in a topological space. Consequently each firewall rule can be seen as a region within the space of filtering fields. Anomalies are relations between rules that hint at possible misconfiguration of firewalls. In this paper, we put forward a calculus that analyzes the topological relationship between firewall rules. Anomalies are definable in the calculus. Within this framework, a constraint satisfaction technique is proposed to reconfigure an anomalous firewall.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Automatic Verification of Security Policies in Firewalls with Dynamic Rule Sequence
    Gawanmeh, Amjad
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 279 - 284
  • [2] A Topological Calculus for Firewalls
    Kalita, Shobhanjana
    Hazarika, Shyamanta M.
    2013 1ST INTERNATIONAL CONFERENCE ON EMERGING TRENDS AND APPLICATIONS IN COMPUTER SCIENCE (ICETACS), 2013, : 219 - 223
  • [3] Verification of Distributed Firewalls
    Gouda, Mohamed G.
    Liu, Alex X.
    Jafry, Mansoor
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [4] Verification and validation of large rule bases
    Krost, G
    Salek, K
    ENGINEERING INTELLIGENT SYSTEMS FOR ELECTRICAL ENGINEERING AND COMMUNICATIONS, 1997, 5 (02): : 83 - 89
  • [5] Verification and validation of large rule bases
    Krost, G.
    Salek, K.
    International Journal of Engineering Intelligent Systems for Electrical Engineering and Communications, 1997, 5 (02): : 83 - 89
  • [6] Rule Anomalies Detection in Firewalls
    Liao Xiaoju
    Wang Yi
    Lu Hai
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 822 - 827
  • [7] Offline Validation of Firewalls
    Windmueller, Stephan
    2011 34TH IEEE SOFTWARE ENGINEERING WORKSHOP (SEW 2011), 2011, : 36 - 41
  • [8] Linear-Time Verification of Firewalls
    Acharya, H. B.
    Gouda, M. G.
    2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 133 - 140
  • [9] Specification and verification of security policies in firewalls
    Jalili, R
    Rezvani, M
    EURASIA-ICT 2002: INFORMATION AND COMMUNICATION TECHNOLOGY, PROCEEDINGS, 2002, 2510 : 154 - 163
  • [10] Ethical firewalls, limited admissibility, and Rule 703
    Blinka, Daniel D.
    FORDHAM LAW REVIEW, 2007, 76 (03) : 1229 - 1262