The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing
| dc.contributor.author | Tuglular, T. | |
| dc.contributor.author | Kaya, Ö. | |
| dc.contributor.author | Müftüoǧlu, C.A. | |
| dc.contributor.author | Belli, F. | |
| dc.date.accessioned | 2023-10-30T08:07:02Z | |
| dc.date.available | 2023-10-30T08:07:02Z | |
| dc.date.issued | 2009 | |
| dc.description.abstract | Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of rules where each rule is represented as a predicate and an action. This paper proposes modeling of firewall rules via directed acyclic graphs (DAG), from which test cases can be automatically generated for firewall testing. The approach proposed follows test case generation algorithm developed for event sequence graphs. Under a local area network setup with the aid of a specifically developed software for this purpose, generated test cases are converted to network test packets, test packets are sent to the firewall under test (FUT), and sent packets are compared with passed packets to determine test result. © 2009 IEEE. | en_US |
| dc.identifier.citation | 6 | |
| dc.identifier.doi | 10.1109/SSIRI.2009.52 | |
| dc.identifier.isbn | 9780769537580 | |
| dc.identifier.scopus | 2-s2.0-72849151217 | |
| dc.identifier.uri | https://doi.org/10.1109/SSIRI.2009.52 | |
| dc.identifier.uri | http://65.108.157.135:4000/handle/123456789/58 | |
| dc.language.iso | en | en_US |
| dc.relation.ispartof | SSIRI 2009 - 3rd IEEE International Conference on Secure Software Integration Reliability Improvement -- 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009 -- 8 July 2009 through 10 July 2009 -- Shanghai -- 78774 | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Directed acyclic graphs | en_US |
| dc.subject | Event sequence graphs | en_US |
| dc.subject | Firewall policies | en_US |
| dc.subject | Firewall testing | en_US |
| dc.subject | Firewalls | en_US |
| dc.subject | Security testing | en_US |
| dc.title | The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C5 | |
| gdc.description.department | Izmir Institute of Technology İYTE | en_US |
| gdc.description.departmenttemp | Tuglular, T., Department of Computer Engineering, Izmir Institute of Technology, Turkey; Kaya, Ö., Department of Computer Engineering, Izmir Institute of Technology, Turkey; Müftüoǧlu, C.A., Department of Computer Engineering, Izmir Institute of Technology, Turkey; Belli, F., Department of Computer Science, Electrical Engineering and Mathematics, University of Paderborn, Germany | en_US |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| gdc.opencitations.count | 7 | |
| gdc.plumx.crossrefcites | 3 | |
| gdc.plumx.mendeley | 24 | |
| gdc.plumx.scopuscites | 6 | |
| gdc.scopus.citedbycount | 6 | |
| gdc.sobiad.citedbycount | 0 | |
| relation.isAuthorOfPublication | 16066bf2-f189-4d4b-91e8-3fc6cb495163 | |
| relation.isAuthorOfPublication.latestForDiscovery | 16066bf2-f189-4d4b-91e8-3fc6cb495163 | |
| relation.isOrgUnitOfPublication | c6842224-7566-492d-b2b4-2d51b18ef9e3 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | c6842224-7566-492d-b2b4-2d51b18ef9e3 |
