Firewall policy reconstruction by active probing: An attacker's view

Taghrid Samak*, Adel El-Atawy, Ehab Al-Shaer, Li Hong

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

Having a firewall policy that is correct and complete is crucial to the safety of the computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this paper we show how an attacker can reconstruct a firewall's policy by probing the firewall by sending tailored packets into a network and forming an idea of what the policy looks like. We present two approaches of compiling this information into a policy that can be arbitrary close to the original one used in the deployed firewall. The first approach is based on region growing from single firewall response to sample packets. The other approach uses split-and-merge in order to divide the space of the firewall's rules and analyzes each independently. Both techniques merge the results obtained into a more compact version of the policies reconstructed.

Original languageEnglish
Title of host publication2nd Workshop on Secure Network Protocols, NPSec
Pages20-25
Number of pages6
DOIs
StatePublished - 2006
Externally publishedYes
Event2006 2nd Workshop on Secure Network Protocols, NPSec - Santa Barbara, CA, United States
Duration: 12 Nov 200612 Nov 2006

Publication series

Name2nd Workshop on Secure Network Protocols, NPSec

Conference

Conference2006 2nd Workshop on Secure Network Protocols, NPSec
Country/TerritoryUnited States
CitySanta Barbara, CA
Period12/11/0612/11/06

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Firewall policy reconstruction by active probing: An attacker's view'. Together they form a unique fingerprint.

Cite this