Formal approach for managing firewall misconfigurations

被引:0
|
作者
Saadaoui, Amina [1 ]
Ben Souayeh, Nihel Ben Youssef [1 ]
Bouhoula, Adel [1 ]
机构
[1] Univ Carthage, Digital Secur Res Unit, Higher Sch Commun Tunis SupCom, Carthage, Tunisia
关键词
Firewall configuration; Security policy; Filtering rules; Misconfigurations; Anomalies; Inference system; automatic resolution; ANOMALIES;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Firewalls are essential components in network security solutions. They implement a network security policy which represents the highest level requirements for controlling the resource accesses. The effectiveness of security protection provided by a firewall mainly depends on the quality of the configuration implemented in it. Unfortunately, different conflicts between filtering rules may occur which make the network vulnerable to attacks. Manual management of this problem can be overwhelming and potentially inaccurate. Therefore, there is a need of automated methods to analyze, detect and correct misconfigurations. Prior solutions have been proposed but we note their drawbacks are threefold: First, common approaches deal only with pairwise filtering rules. In such a way, some other classes of configuration anomalies could be uncharted. Second, syntactic anomalies could be intentional (i.e., not perforce misconfigurations). This substantial distinction is not often highlighted. Third, although anomalies resolution is a tedious and error prone task, it is generally given to the network administrator. We present, in this paper, a formal approach whose contributions are the following: Detecting new classes of anomalies, bringing out real misconfigurations and finally, proposing automatic resolution method by considering the security policy. We prove the soundness of our method and demonstrate its applicability and scalability by the use of a Satisfiabilty Solver. The first results we obtained are very promising.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A Formal Approach for Automatic Detection and Correction of SDN Switch Misconfigurations
    Saied, Wejdene
    Bouhoula, Adel
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2020,
  • [2] Automated and optimized FDD-based method to fix firewall misconfigurations
    Saadaoui, Amina
    Ben Souayeh, Nihel Ben Youssef
    Bouhoula, Adel
    [J]. 2015 IEEE 14TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2015, : 63 - 67
  • [3] A New FDD-Based Method for Distributed Firewall Misconfigurations Resolution
    Saadaoui, Amina
    Ben Souayeh, Nihel Ben Youssef
    Bouhoula, Adel
    [J]. INFORMATION SYSTEMS, EMCIS 2017, 2017, 299 : 369 - 383
  • [4] A formal logic approach to firewall packet filtering analysis and generation
    Govaerts, John
    Bandara, Arosha
    Curran, Kevin
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2008, 29 (3-4) : 223 - 248
  • [5] A formal logic approach to firewall packet filtering analysis and generation
    John Govaerts
    Arosha Bandara
    Kevin Curran
    [J]. Artificial Intelligence Review, 2008, 29
  • [6] Formal verification of firewall policies
    Liu, Alex X.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1494 - 1498
  • [7] A FORMAL APPROACH TO MANAGING DESIGN PROCESSES
    BALDWIN, RA
    CHUNG, MJ
    [J]. COMPUTER, 1995, 28 (02) : 54 - 63
  • [8] A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies
    Khoumsi, Ahmed
    Krombi, Wadie
    Erradi, Mohammed
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 221 - 236
  • [9] An automated formal approach to managing dynamic reconfiguration
    Warren, Ian
    Sun, Jing
    Krishnamohan, Sanjev
    Weerasinghe, Thiranjith
    [J]. ASE 2006: 21ST IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, 2006, : 37 - 46
  • [10] Behind the firewall - A case for formal intranet leadership
    White, M
    [J]. ECONTENT, 2001, 24 (05) : 51 - 52