Automated pseudo-live testing of firewall configuration enforcement

  • Ehab Al-Shaer*
  • , Adel El-Atawy
  • , Taghrid Samak
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

32 Scopus citations

Abstract

Network security devices such as firewalls and intrusion detection systems are constantly updated in their implementation to accommodate new features, performance standards and to utilize new hardware optimization. Reliable, yet practical, testing techniques for validating the configuration enforcement after every new software and firmware update become necessary to assure correct configuration realization. Generating random traffic to test the firewall configuration enforcement is not only inaccurate but also impractical as it requires an infeasible number of test cases for a reasonable testing coverage. In addition, in most cases the policies used during testing are manually generated or have limited configuration profiles. We present a framework for automatic testing of the firewall configuration enforcement using efficient and flexible policy and traffic generation. In a typical test session, a large set of different policies are generated based on the access-control list (ACL) grammar and according to custom profiles. Test packets are generated to particularly consider critical segments of the tested policies and to achieve high coverage of the testing space. We also describe our implementation of a fully-automated framework, which includes ACL grammar modeling, the policy generation, test cases generation, capturing and analyzing firewall output, and creating detailed test reports. Our evaluation results show that our security configuration testing is not only achievable but it also offers high coverage with significant degree of confidence.

Original languageEnglish
Article number4808474
Pages (from-to)302-314
Number of pages13
JournalIEEE Journal on Selected Areas in Communications
Volume27
Issue number3
DOIs
StatePublished - Apr 2009
Externally publishedYes

Bibliographical note

Funding Information:
Manuscript received 11 April 2008; revised 15 November 2008. This research was supported in part by National Science Foundation under Grant No. CNS-0834686 and Cisco. Any opinions, findings, conclusions or recommendations stated in this material are those of the authors and do not necessarily reflect the views of the funding sources.

Keywords

  • Automated security analysis
  • Firewall testing
  • Policy enforcement validation
  • Policy generation
  • Security configuration testing
  • Security evaluation
  • network security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Automated pseudo-live testing of firewall configuration enforcement'. Together they form a unique fingerprint.

Cite this