DocumentCode :
561275
Title :
Modeling and verification of firewall configurations using domain restriction method
Author :
Gawanmeh, Amjad ; Tahar, Sofiène
Author_Institution :
Khalifa Univ., Sharjah, United Arab Emirates
fYear :
2011
fDate :
11-14 Dec. 2011
Firstpage :
642
Lastpage :
647
Abstract :
Firewalls play an important role in the security of communication systems. They are widely adopted for protecting private networks by filtering out undesired network traffic in and out of the secured network. The verification of firewalls is a great challenge because of the dynamic characteristics of their operation, their configuration is highly error prone, and finally, they are considered the first defense to secure networks against attacks and unauthorized access. In this paper, we propose a new approach for modeling and verification of firewall configuration rules using domain restriction method. Our approach is implemented in Event-B formal techniques, where we model firewall configuration rules, and then use invariant checking to verify the consistency of firewall configurations in Event-B theorem proving framework.
Keywords :
computer network security; formal verification; telecommunication traffic; theorem proving; communication system security; domain restriction method; event-b formal techniques; event-b theorem proving framework; firewall configuration modelling; firewall configuration verification; invariant checking; network traffic; private network protection; Concrete; Fires; IP networks; Mathematical model; Neodymium; Protocols; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2011 International Conference for
Conference_Location :
Abu Dhabi
Print_ISBN :
978-1-4577-0884-8
Type :
conf
Filename :
6148413
Link To Document :
بازگشت