Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

First step towards automatic correction of firewall policy faults

Authors Info & Claims
Published:30 July 2012Publication History
Skip Abstract Section

Abstract

Firewalls are critical components of network security and have been widely deployed for protecting private networks. A firewall determines whether to accept or discard a packet that passes through it based on its policy. However, most real-life firewalls have been plagued with policy faults, which either allow malicious traffic or block legitimate traffic. Due to the complexity of firewall policies, manually locating the faults of a firewall policy and further correcting them are difficult. Automatically correcting the faults of a firewall policy is an important and challenging problem. In this article, we first propose a fault model for firewall policies including five types of faults. For each type of fault, we present an automatic correction technique. Second, we propose the first systematic approach that employs these five techniques to automatically correct all or part of the misclassified packets of a faulty firewall policy. Third, we conducted extensive experiments to evaluate the effectiveness of our approach. Experimental results show that our approach is effective to correct a faulty firewall policy with three of these types of faults.

References

  1. Al-Shaer, E., El-Atawy, A., and Samak, T. 2009. Automated pseudo-live testing of firewall configuration enforcement. IEEE J. Select. Areas Comm. 27, 302--314. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Al-Shaer, E. and Hamed, H. 2004. Discovery of policy anomalies in distributed firewalls. In Proceedings of IEEE Conference on Computer Communications (INFOCOM). 2605--2616.Google ScholarGoogle Scholar
  3. Baboescu, F. and Varghese, G. 2002. Fast and scalable conflict detection for packet classifiers. In Proceedings of IEEE International Conference on Network Protocols (ICNP). 717--735. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. CERT. 2001. Test the firewall system. http://www.cert.org/security-improvement/practices/p060.html.Google ScholarGoogle Scholar
  5. Chen, F., Liu, A. X., Hwang, J., and Xie, T. 2010. First step towards automatic correction of firewall policy faults. In Proceedings of USENIX Large Installation System Administration Conference (LISA). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cisco Reflexive ACLs 2012. http://www.cisco.com/.Google ScholarGoogle Scholar
  7. DeMillo, R. A., Lipton, R. J., and Sayward, F. G. 1978. Hints on test data selection: Help for the practicing programmer. IEEE Comput. 11, 4, 34--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Hari, A., Suri, S., and Parulkar, G. M. 2000. Detecting and resolving packet filter conflicts. In Proceedings of IEEE Conference on Computer Communications (INFOCOM). 1203--1212.Google ScholarGoogle Scholar
  9. Hoffman, D. and Yoo, K. 2005. Blowtorch: a framework for firewall test automation. In Proceedings of International Conference on Automated Software Engineering (AES). 96--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hwang, J., Xie, T., Chen, F., and Liu, A. X. 2008. Systematic structural testing of firewall policies. In Proceedings of IEEE International Symposium on Reliable Distributed Systems (SRDS). 105--114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hwang, J., Xie, T., Chen, F., and Liu, A. X. 2009. Fault localization for firewall policies. In Proceedings of IEEE International Symposium on Reliable Distributed Systems (SRDS). 100--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jürjens, J. and Wimmel, G. 2001. Specification-based testing of firewalls. In Proceedings of International Conference Perspectives of System Informatics (PSI). 308--316. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Liu, A. X. 2007. Change-impact analysis of firewall policies. In Proceedings of European Symposium Research Computer Security (ESORICS). 155--170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Liu, A. X. and Gouda, M. G. 2008. Diverse firewall design. IEEE Trans. Parallel Distrib. Syst. 19, 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Liu, A. X., Zhou, Y., and Meiners, C. R. 2008. All-match based complete redundancy removal for packet classifiers in TCAMs. In Proceedings of IEEE Conference on Computer Communications (INFOCOM). 574--582.Google ScholarGoogle Scholar
  16. Lyu, M. R. and Lau, L. K. Y. 2000. Firewall security: Policies, testing and performance evaluation. In Proceedings of International Conference on Computer Systems and Applications (COMPSAC). 116--121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Marmorstein, R. and Kearns, P. 2007. Assisted firewall policy repair using examples and history. In Proceedings of USENIX Large Installation System Administration Conference (LISA). 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Nessus. 2004. http://www.nessus.org/.Google ScholarGoogle Scholar
  19. Satan. 1995. http://www.porcupine.org/satan/.Google ScholarGoogle Scholar
  20. Tang, Y., Al-Shaer, E., and Boutaba, R. 2008. Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks. IEEE Trans. Netw. Service Manag. 5, 36--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Wool, A. 2004. A quantitative study of firewall configuration errors. IEEE Comput. 37, 6, 62--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yuan, L., Chen, H., Mai, J., Chuah, C.-N., Su, Z., and Mohapatra, P. 2006. Fireman: a toolkit for firewall modeling and analysis. In Proceedings of IEEE Symposium on Security and Privacy (IEEE S&P). 199--213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Zeller, A. 2002. Isolating cause-effect chains from computer programs. In Proceedings of ACM SIGSOFT Symposium on Foundations of Software Engineering (FSE). 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. First step towards automatic correction of firewall policy faults

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Autonomous and Adaptive Systems
        ACM Transactions on Autonomous and Adaptive Systems  Volume 7, Issue 2
        July 2012
        275 pages
        ISSN:1556-4665
        EISSN:1556-4703
        DOI:10.1145/2240166
        Issue’s Table of Contents

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 July 2012
        • Accepted: 1 July 2011
        • Revised: 1 April 2011
        • Received: 1 October 2010
        Published in taas Volume 7, Issue 2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader