【24h】

Model Checking Firewall Policy Configurations

机译:模型检查防火墙策略配置

获取原文

摘要

The use of firewalls to enforce access control policies can result in extremely complex networks. Each individual firewall may have hundreds or thousands of rules, and when combined in a network, they may result in unexpected combined behavior. To mitigate this problem, there has been interest in the use of model checking techniques for analyzing the behavior of firewall policy configurations, and reporting anomalies. Existing techniques for firewall policy analysis are based on decision diagrams, most normally reduced ordered binary decision diagrams (BDDs). BDDs are a rich data structure, supporting more logical operations than just solving Boolean formulae. Typically, search algorithms for Boolean satisfiability (so-called SAT-solvers) outperform BDDs. In this paper, we show that the extra structure provided by BDDs is not necessary for firewall policy analysis, and that SAT solvers are sufficient. This argument is supported both by theoretical analysis and by experimental data.
机译:防火墙用于强制执行访问控制策略可能导致极其复杂的网络。每个防火墙都可能有数百或数千条规则,并且在网络中组合时,它们可能会导致意外的组合行为。为缓解此问题,有兴趣使用模型检查技术来分析防火墙策略配置的行为和报告异常。防火墙策略分析的现有技术基于决策图,最常降低的订购二进制决策图(BDD)。 BDD是一种丰富的数据结构,支持比求解布尔公式的更多逻辑操作。通常,搜索布尔可满足性(所谓的SAT-Solvers)优于BDD的搜索算法。在本文中,我们表明,BDDS提供的额外结构是防火墙策略分析所必需的,并且SAT求解器就足够了。通过理论分析和实验数据支持此参数。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号