Abstract
Network security devices such as firewalls and intrusion detection systems are constantly updated in their implementation to accommodate new features, performance standards and to utilize new hardware optimization. Reliable, yet practical, testing techniques for validating the configuration enforcement after every new software and firmware update become necessary to assure correct configuration realization. Generating random traffic to test the firewall configuration enforcement is not only inaccurate but also impractical as it requires an infeasible number of test cases for a reasonable testing coverage. In addition, in most cases the policies used during testing are manually generated or have limited configuration profiles. We present a framework for automatic testing of the firewall configuration enforcement using efficient and flexible policy and traffic generation. In a typical test session, a large set of different policies are generated based on the access-control list (ACL) grammar and according to custom profiles. Test packets are generated to particularly consider critical segments of the tested policies and to achieve high coverage of the testing space. We also describe our implementation of a fully-automated framework, which includes ACL grammar modeling, the policy generation, test cases generation, capturing and analyzing firewall output, and creating detailed test reports. Our evaluation results show that our security configuration testing is not only achievable but it also offers high coverage with significant degree of confidence.
| Original language | English |
|---|---|
| Article number | 4808474 |
| Pages (from-to) | 302-314 |
| Number of pages | 13 |
| Journal | IEEE Journal on Selected Areas in Communications |
| Volume | 27 |
| Issue number | 3 |
| DOIs | |
| State | Published - Apr 2009 |
| Externally published | Yes |
Bibliographical note
Funding Information:Manuscript received 11 April 2008; revised 15 November 2008. This research was supported in part by National Science Foundation under Grant No. CNS-0834686 and Cisco. Any opinions, findings, conclusions or recommendations stated in this material are those of the authors and do not necessarily reflect the views of the funding sources.
Keywords
- Automated security analysis
- Firewall testing
- Policy enforcement validation
- Policy generation
- Security configuration testing
- Security evaluation
- network security
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering
Fingerprint
Dive into the research topics of 'Automated pseudo-live testing of firewall configuration enforcement'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver