A formal approach to verify completeness and detect anomalies in firewall security policies

8Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security policies are a relevant solution to protect information systems from undue accesses. In this paper, we develop a formal and rigorous automata-based approach to design and analyze security policies. The interest of our approach is that it can be used as a common basis for analyzing several aspects of security policies, instead of using a distinct approach and formalism for studying each aspect. We first develop a procedure that synthesizes automatically an automaton which implements a given security policy. Then, we apply this synthesis procedure to verify completeness of security policies and detect several types of anomalies in security policies. We also study space and time complexities of the developed procedures.

Cite

CITATION STYLE

APA

Khoumsi, A., Krombi, W., & Erradi, M. (2015). A formal approach to verify completeness and detect anomalies in firewall security policies. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8930, 221–236. https://doi.org/10.1007/978-3-319-17040-4_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free