This is a Demo Server. Data inside this system is only for test purpose.
 

The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing

dc.contributor.author Tuglular, T.
dc.contributor.author Kaya, Ö.
dc.contributor.author Müftüoǧlu, C.A.
dc.contributor.author Belli, F.
dc.date.accessioned 2023-10-30T08:07:02Z
dc.date.available 2023-10-30T08:07:02Z
dc.date.issued 2009
dc.description.abstract Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of rules where each rule is represented as a predicate and an action. This paper proposes modeling of firewall rules via directed acyclic graphs (DAG), from which test cases can be automatically generated for firewall testing. The approach proposed follows test case generation algorithm developed for event sequence graphs. Under a local area network setup with the aid of a specifically developed software for this purpose, generated test cases are converted to network test packets, test packets are sent to the firewall under test (FUT), and sent packets are compared with passed packets to determine test result. © 2009 IEEE. en_US
dc.identifier.citation 6
dc.identifier.doi 10.1109/SSIRI.2009.52
dc.identifier.isbn 9780769537580
dc.identifier.scopus 2-s2.0-72849151217
dc.identifier.uri https://doi.org/10.1109/SSIRI.2009.52
dc.identifier.uri http://65.108.157.135:4000/handle/123456789/58
dc.language.iso en en_US
dc.relation.ispartof SSIRI 2009 - 3rd IEEE International Conference on Secure Software Integration Reliability Improvement -- 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009 -- 8 July 2009 through 10 July 2009 -- Shanghai -- 78774 en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.subject Directed acyclic graphs en_US
dc.subject Event sequence graphs en_US
dc.subject Firewall policies en_US
dc.subject Firewall testing en_US
dc.subject Firewalls en_US
dc.subject Security testing en_US
dc.title The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing en_US
dc.type Conference Object en_US
dspace.entity.type Publication
gdc.bip.impulseclass C5
gdc.bip.influenceclass C5
gdc.bip.popularityclass C5
gdc.description.department Izmir Institute of Technology İYTE en_US
gdc.description.departmenttemp Tuglular, T., Department of Computer Engineering, Izmir Institute of Technology, Turkey; Kaya, Ö., Department of Computer Engineering, Izmir Institute of Technology, Turkey; Müftüoǧlu, C.A., Department of Computer Engineering, Izmir Institute of Technology, Turkey; Belli, F., Department of Computer Science, Electrical Engineering and Mathematics, University of Paderborn, Germany en_US
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı en_US
gdc.opencitations.count 7
gdc.plumx.crossrefcites 3
gdc.plumx.mendeley 24
gdc.plumx.scopuscites 6
gdc.scopus.citedbycount 6
gdc.sobiad.citedbycount 0
relation.isAuthorOfPublication 16066bf2-f189-4d4b-91e8-3fc6cb495163
relation.isAuthorOfPublication.latestForDiscovery 16066bf2-f189-4d4b-91e8-3fc6cb495163
relation.isOrgUnitOfPublication c6842224-7566-492d-b2b4-2d51b18ef9e3
relation.isOrgUnitOfPublication.latestForDiscovery c6842224-7566-492d-b2b4-2d51b18ef9e3

Files

Collections