TY - GEN
T1 - Firewall policy reconstruction by active probing
T2 - 2006 2nd Workshop on Secure Network Protocols, NPSec
AU - Samak, Taghrid
AU - El-Atawy, Adel
AU - Al-Shaer, Ehab
AU - Hong, Li
PY - 2006
Y1 - 2006
N2 - Having a firewall policy that is correct and complete is crucial to the safety of the computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this paper we show how an attacker can reconstruct a firewall's policy by probing the firewall by sending tailored packets into a network and forming an idea of what the policy looks like. We present two approaches of compiling this information into a policy that can be arbitrary close to the original one used in the deployed firewall. The first approach is based on region growing from single firewall response to sample packets. The other approach uses split-and-merge in order to divide the space of the firewall's rules and analyzes each independently. Both techniques merge the results obtained into a more compact version of the policies reconstructed.
AB - Having a firewall policy that is correct and complete is crucial to the safety of the computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this paper we show how an attacker can reconstruct a firewall's policy by probing the firewall by sending tailored packets into a network and forming an idea of what the policy looks like. We present two approaches of compiling this information into a policy that can be arbitrary close to the original one used in the deployed firewall. The first approach is based on region growing from single firewall response to sample packets. The other approach uses split-and-merge in order to divide the space of the firewall's rules and analyzes each independently. Both techniques merge the results obtained into a more compact version of the policies reconstructed.
UR - https://www.scopus.com/pages/publications/46249130521
U2 - 10.1109/NPSEC.2006.320342
DO - 10.1109/NPSEC.2006.320342
M3 - Conference contribution
AN - SCOPUS:46249130521
SN - 1424407737
SN - 9781424407736
T3 - 2nd Workshop on Secure Network Protocols, NPSec
SP - 20
EP - 25
BT - 2nd Workshop on Secure Network Protocols, NPSec
Y2 - 12 November 2006 through 12 November 2006
ER -