Automatic verification of firewall configuration with respect to security policy requirements

24Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Firewalls are key security components in computer networks. They filter network traffics based on an ordered list of filtering rules. Firewall configurations must be correct and complete with respect to security policies. Security policy is a set of predicates, which is a high level description of traffic controls. In this paper, we propose an automatic method to verify the correctness of firewall configuration. We have defined a boolean formula representation of security policy. With the boolean formula representations of security policy and firewall configuration, we can formulate the condition that ensures correctness of firewall configuration. We use SAT solver to check the validity of the condition. If the configuration is not correct, our method produces an example of packet to help users to correct the configuration. We have implemented a prototype verifier and had some experimental results. The first results were very promising. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Matsumoto, S., & Bouhoula, A. (2009). Automatic verification of firewall configuration with respect to security policy requirements. In Advances in Soft Computing (Vol. 53, pp. 123–130). https://doi.org/10.1007/978-3-540-88181-0_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free