Firewall conformance testing

31Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Firewalls are widely used to protect networks from unauthorised access. To ensure that they implement an organisation's security policy correctly, they need to be tested. We present an approach that addresses this problem. Namely, we show how an organisation's network security policy can be formally specified in a high-level way, and how this specification can be used to automatically generate test cases to test a deployed system. In contrast to other firewall testing methodologies, such as penetration testing, our approach tests conformance to a specified policy. Our test cases are organisation-specific - i.e. they depend on the security requirements and on the network topology of an organisation - and can uncover errors both in the firewall products themselves and in their configuration. © IFIP 2005.

Cite

CITATION STYLE

APA

Senn, D., Basin, D., & Caronni, G. (2005). Firewall conformance testing. In Lecture Notes in Computer Science (Vol. 3502, pp. 226–241). Springer Verlag. https://doi.org/10.1007/11430230_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free