• DocumentCode
    187449
  • Title

    Formal approach for managing firewall misconfigurations

  • Author

    Saadaoui, Amina ; Ben Souayeh, Nihel Ben Youssef ; Bouhoula, Adel

  • Author_Institution
    Higher Sch. of Commun. of Tunis (Sup´Com), Univ. of Carthage, Carthage, Tunisia
  • fYear
    2014
  • fDate
    28-30 May 2014
  • Firstpage
    1
  • Lastpage
    10
  • Abstract
    Firewalls are essential components in network security solutions. They implement a network security policy which represents the highest level requirements for controlling the resource accesses. The effectiveness of security protection provided by a firewall mainly depends on the quality of the configuration implemented in it. Unfortunately, different conflicts between filtering rules may occur which make the network vulnerable to attacks. Manual management of this problem can be overwhelming and potentially inaccurate. Therefore, there is a need of automated methods to analyze, detect and correct misconfigurations. Prior solutions have been proposed but we note their drawbacks are threefold: First, common approaches deal only with pairwise filtering rules. In such a way, some other classes of configuration anomalies could be uncharted. Second, syntactic anomalies could be intentional (i.e., not perforce misconfigurations). This substantial distinction is not often highlighted. Third, although anomalies resolution is a tedious and error prone task, it is generally given to the network administrator. We present, in this paper, a formal approach whose contributions are the following: Detecting new classes of anomalies, bringing out real misconfigurations and finally, proposing automatic resolution method by considering the security policy. We prove the soundness of our method and demonstrate its applicability and scalability by the use of a Satisfiabilty Solver. The first results we obtained are very promising.
  • Keywords
    computability; firewalls; formal specification; resource allocation; automatic resolution method; filtering rules; firewall misconfiguration management; formal approach; network administrator; network security policy; pairwise filtering rules; resource accesses; satisfiability solver; security protection; syntactic anomalies; Correlation; Firewalls (computing); Shadow mapping; Syntactics; Web servers; Anomalies; Filtering rules; Firewall configuration; Inference system; Misconfigurations; Security policy; automatic resolution;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Research Challenges in Information Science (RCIS), 2014 IEEE Eighth International Conference on
  • Conference_Location
    Marrakech
  • Type

    conf

  • DOI
    10.1109/RCIS.2014.6861044
  • Filename
    6861044