Model checking a firewall for anomalies

Firewall is the primary network security specified in form of rules that dictate what would and would not be passed to a secured network. Network administrators need to undertake a lot of manual task to get the correct configuration for securing the organization's network resources. Therefore filter properties called anomalies that hint at possible misconfigurations have been introduced. Verification of firewalls for identification of anomalies is a challenging task. We propose to do this within a formal framework using a custom built model checker.

[2]  Guillermo Ricardo Simari,et al.  An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration , 2013, QSHINE.

[3]  Avishai Wool,et al.  A quantitative study of firewall configuration errors , 2004, Computer.

[4]  Gail-Joon Ahn,et al.  Detecting and Resolving Firewall Policy Anomalies , 2012, IEEE Transactions on Dependable and Secure Computing.

[5]  Roger Villemaire,et al.  Firewall anomaly detection with a model checker for visibility logic , 2012, 2012 IEEE Network Operations and Management Symposium.

[6]  Scott Hazelhurst,et al.  BINARY DECISION DIAGRAM REPRESENTATIONS OF FIREWALL AND ROUTER ACCESS LISTS , 1998 .

[7]  Hans W. Guesgen,et al.  Qualitative Spatial and Temporal Reasoning: Emerging Applications, Trends, and Directions , 2011, Spatial Cogn. Comput..

[8]  Pasi Eronen,et al.  An expert system for analyzing firewall rules , 2001 .

[9]  E. Al-Shaer,et al.  Firewall Policy Advisor for anomaly discovery and rule editing , 2003, IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003..

[10]  Alessandra Russo,et al.  Using Argumentation Logic for Firewall Policy Specification and Analysis , 2006, DSOM.

[11]  Michael,et al.  Qualitative spatio-temporal representation andreasoning : a computational perspectiveFrank , 2001 .

[12]  Mohamed G. Gouda,et al.  Structured firewall design , 2007, Comput. Networks.

[13]  Roger Villemaire,et al.  Strong Temporal, Weak Spatial Logic for Rule Based Filters , 2009, 2009 16th International Symposium on Temporal Representation and Reasoning.

[14]  Nora Cuppens-Boulahia,et al.  Complete analysis of configuration rules to guarantee reliable network security policies , 2008, International Journal of Information Security.

[15]  Yoshiaki Katayama,et al.  A topological approach to detect conflicts in firewall policies , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[16]  Edmund M. Clarke My 27-year Quest to Overcome the State Explosion Problem , 2009, 2009 24th Annual IEEE Symposium on Logic In Computer Science.