Loading...

Specification and verification of security policies in firewalls

Jalili, R ; Sharif University of Technology | 2002

113 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/3-540-36087-5_18
  3. Publisher: 2002
  4. Abstract:
  5. Rules are used as a way of managing and configuring firewalls to fulfill security requirements in most cases. Managers have to specify their organizational security policies using low level and order-dependent rules. Furthermore, dependency of firewalls to the network topology, frequent changes in network topology (specially in dynamic networks), and lack of a method for analysis and verification of specified security policy may reduce to inconsistencies and security holes. Existence of a higher level environment for security policy specification can rectify part of the problems. In this paper we present a language for high level and formal specification of security policy in firewalls. Using the language, a security manager can configure its firewall based on his required security policy independent of the network topology. The language is used as a framework for analysis and verification of security policies. We designed and implemented a tool based on theorem proving for detecting inconsistencies, coverage, as well as applying a query on the specified policy. Results of analysis can be used to detect security vulnerabilities. © Springer-Verlag Berlin Heidelberg 2002
  6. Keywords:
  7. Firewall ; Formal specification ; Security policy
  8. Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 2510 , 2002 , Pages 154-163 ; 03029743 (ISSN)
  9. URL: https://link.springer.com/chapter/10.1007/3-540-36087-5_18