Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/11430230_16guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Firewall conformance testing

Published: 31 March 2005 Publication History

Abstract

Firewalls are widely used to protect networks from unauthorised access. To ensure that they implement an organisation’s security policy correctly, they need to be tested. We present an approach that addresses this problem. Namely, we show how an organisation’s network security policy can be formally specified in a high-level way, and how this specification can be used to automatically generate test cases to test a deployed system. In contrast to other firewall testing methodologies, such as penetration testing, our approach tests conformance to a specified policy. Our test cases are organisation-specific — i.e. they depend on the security requirements and on the network topology of an organisation — and can uncover errors both in the firewall products themselves and in their configuration.

References

[1]
J. Burns, A. Cheng, P. Gurung, S. Rajagopalan, P. Rao, D. Rosenbluth, A. V. Surendran, and D. M. Martin. Automatic management of network security policy. In Proceedings of DISCEX II, 2001.
[2]
Yair Bartal, Alain J. Mayer, Kobbi Nissim, and Avishai Wool. Firmato: A novel firewall management toolkit. In IEEE Symposium on Security and Privacy, pages 17-31, 1999.
[3]
Yair Bartal, Alain J. Mayer, Kobbi Nissim, and Avishai Wool. Firmato: A novel firewall management toolkit. Technical report, Dept. Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978 Israel, February 2003.
[4]
Tsun S. Chow. Testing software design modeled by finite-state machines. In IEEE Transactions on Software Engineering, Vol. SE-4, No 3, pages 178-187, May 1978.
[5]
V. Fuller, T. Li, J. Yu, and K. Varadhan. RFC 1519: Classless interdomain routing (CIDR): an address assignment and aggregation strategy. http://www.ietf.org/rfc/rfc1519.txt, September 1993.
[6]
John B. Goodenough and Susan L. Gerhart. Toward a theory of test data selection. In IEEE Transactions on Software Engineering (TSE), Volume 1, Number 2, pages 156-173, June 1975.
[7]
A. Gill. State-identification experiments in finite automata. In Information and Control, vol. 4, pages 132 - 154, 1961.
[8]
A. Gill. Introduction to the Theory of Finite-state Machines. McGraw-Hill, 1962.
[9]
J. D. Guttman. Filtering postures: Local enforcement for global policies. In 1997 IEEE Symposium on Security and Privacy, pages 120-129, Oakland, CA, 1997. IEEE Computer Society Press.
[10]
Reto E. Haeni. Firewall penetration testing. Technical report, The George Washington University Cyberspace Policy Institute, 2033 K St, Suite 340N, Washington, DC, 20006, US, January 1997.
[11]
Jan Jürjens and Guido Wimmel. Specification-based testing of firewalls. In Andrei Ershov, editor, 4th International Conference Perspectives of System Informatics (PSI'01), LNCS. Springer, 2001.
[12]
Alain Mayer, Avishai Wool, and Elisha Ziskind. Fang: A firewall analysis engine. In Proceedings of the 2000 IEEE Symposium on Security and Privacy (S&P 2000), pages 177-187, May 2000.
[13]
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. RFC 3261 SIP: Session initiation protocol. http://www.ietf.org/rfc/rfc3261.txt, June 2002.
[14]
E. Schultz. How to perform effective firewall testing. In Computer Security Journal, vol. 12, no. 1, pages 47-54, 1996.
[15]
Krishan Sabnani and Anton Dahbura. A protocol test generation procedure. In Computer Networks and ISDN Systems 15, pages 285-297, 1988.
[16]
A. Wool. Architecting the lumeta firewall analyzer. In Proceedings of the 10th USENIX Security Symposium, pages 85-97, August 2001.

Cited By

View all
  • (2016)Online and Offline Security Policy AssessmentProceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats10.1145/2995959.2995970(101-104)Online publication date: 28-Oct-2016
  • (2012)A security enforcement kernel for OpenFlow networksProceedings of the first workshop on Hot topics in software defined networks10.1145/2342441.2342466(121-126)Online publication date: 13-Aug-2012
  • (2011)Security mutants for property-based testingProceedings of the 5th international conference on Tests and proofs10.5555/2025936.2025942(69-77)Online publication date: 30-Jun-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
TestCom'05: Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating Systems
March 2005
379 pages
ISBN:3540260544
  • Editors:
  • Ferhat Khendek,
  • Rachida Dssouli

Sponsors

  • Springer
  • Concordia University: Concordia University
  • IFIP

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 31 March 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Online and Offline Security Policy AssessmentProceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats10.1145/2995959.2995970(101-104)Online publication date: 28-Oct-2016
  • (2012)A security enforcement kernel for OpenFlow networksProceedings of the first workshop on Hot topics in software defined networks10.1145/2342441.2342466(121-126)Online publication date: 13-Aug-2012
  • (2011)Security mutants for property-based testingProceedings of the 5th international conference on Tests and proofs10.5555/2025936.2025942(69-77)Online publication date: 30-Jun-2011
  • (2009)A first order logic security verification model for SIPProceedings of the 2009 IEEE international conference on Communications10.5555/1817271.1817446(937-942)Online publication date: 14-Jun-2009
  • (2009)Protocol-Based Testing of FirewallsProceedings of the 2009 Fourth South-East European Workshop on Formal Methods10.1109/SEEFM.2009.14(53-59)Online publication date: 4-Dec-2009
  • (2009)Firewall policy verification and troubleshootingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2009.07.00353:16(2800-2809)Online publication date: 1-Nov-2009
  • (2008)Firewall policy change-impact analysisACM Transactions on Internet Technology10.1145/2109211.210921211:4(1-24)Online publication date: 23-Mar-2008
  • (2008)Model-Based Firewall Conformance TestingProceedings of the 20th IFIP TC 6/WG 6.1 international conference on Testing of Software and Communicating Systems: 8th International Workshop10.1007/978-3-540-68524-1_9(103-118)Online publication date: 10-Jun-2008
  • (2007)Change-impact analysis of firewall policiesProceedings of the 12th European conference on Research in Computer Security10.5555/2393847.2393863(155-170)Online publication date: 24-Sep-2007
  • (2007)A formal approach for testing security rulesProceedings of the 12th ACM symposium on Access control models and technologies10.1145/1266840.1266860(127-132)Online publication date: 20-Jun-2007
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media