DocumentCode :
1675578
Title :
Verification of Distributed Firewalls
Author :
Gouda, Mohamed G. ; Liu, Alex X. ; Jafry, Mansoor
Author_Institution :
Dept. of Comput. Sci., Univ. of Texas at Austin, Austin, TX
fYear :
2008
Firstpage :
1
Lastpage :
5
Abstract :
The private computer network of any large enterprise has tens, or even hundreds, of firewalls. These firewalls are placed at the entry points of the network (where the network is connected with the rest of the Internet), and at many chosen points within the network. The result is a complex firewall network that seems hard to understand or analyze. In this paper, we propose a method for verifying the correctness of firewall networks with tree topologies. Our method is based on identifying two types of properties of firewall trees: accept and discard properties. An accept (or discard) property of a firewall tree specifies a class of packets that should be accepted (or discarded, respectively) by the firewall tree. We present two algorithms that can be used to decide whether a given firewall tree satisfies a given, accept or discard, property of that tree.
Keywords :
authorisation; computer networks; formal verification; telecommunication network topology; trees (mathematics); distributed firewalls; firewall trees; private computer network; tree topologies; verification; Computer networks; Computer science; Design methodology; Distributed computing; IP networks; Network topology; Polynomials; Security; TCPIP; Virtual private networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE
Conference_Location :
New Orleans, LO
ISSN :
1930-529X
Print_ISBN :
978-1-4244-2324-8
Type :
conf
DOI :
10.1109/GLOCOM.2008.ECP.388
Filename :
4698163
Link To Document :
بازگشت