Network configuration in a box: Towards end-to-end verification of network reachability and security

  • Ehab Al-Shaer*
  • , Will Marrero
  • , Adel El-Atawy
  • , Khalid ElBadawi
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

152 Scopus citations

Abstract

Recent studies show that configurations of network access control is one of the most complex and error prone network management tasks. For this reason, network misconfiguration becomes the main source for network unreachablility and vulnerability problems. In this paper, we present a novel approach that models the global end-to-end behavior of access control configurations of the entire network including routers, IPSec, firewalls, and NAT for unicast and multicast packets. Our model represents the network as a state machine where the packet header and location determines the state. The transitions in this model are determined by packet header information, packet location, and policy semantics for the devices being modeled. We encode the semantics of access control policies with Boolean functions using binary decision diagrams (BDDs). We then use computation tree logic (CTL) and symbolic model checking to investigate all future and past states of this packet in the network and verify network reachability and security requirements. Thus, our contributions in this work is the global encoding for network configurations that allows for general reachability and security property-based verification using CTL model checking. We have implemented our approach in a tool called ConfigChecker. While evaluating ConfigChecker, we modeled and verified network configurations with thousands of devices and millions of configuration rules, thus demonstrating the scalability of this approach.

Original languageEnglish
Title of host publication17th IEEE International Conference on Network Protocols, ICNP '09
Pages123-132
Number of pages10
DOIs
StatePublished - 2009
Externally publishedYes
Event17th IEEE International Conference on Network Protocols, ICNP '09 - Princeton, NJ, United States
Duration: 13 Oct 200916 Oct 2009

Publication series

NameProceedings - International Conference on Network Protocols, ICNP
ISSN (Print)1092-1648

Conference

Conference17th IEEE International Conference on Network Protocols, ICNP '09
Country/TerritoryUnited States
CityPrinceton, NJ
Period13/10/0916/10/09

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Network configuration in a box: Towards end-to-end verification of network reachability and security'. Together they form a unique fingerprint.

Cite this