首页> 外文学位 >Firewall Policy Diagram: Novel Data Structures and Algorithms for Modeling, Analysis, and Comprehension of Network Firewalls.
【24h】

Firewall Policy Diagram: Novel Data Structures and Algorithms for Modeling, Analysis, and Comprehension of Network Firewalls.

机译:防火墙策略图:用于网络防火墙建模,分析和理解的新颖数据结构和算法。

获取原文
获取原文并翻译 | 示例

摘要

Firewalls, network devices, and the access control lists that manage traffic are very important components of modern networking from a security and regulatory perspective. When computers were first connected, they were communicating with trusted peers and nefarious intentions were neither recognized nor important. However, as the reach of networks expanded, systems could no longer be certain whether the peer could be trusted or that their intentions were good. Therefore, a couple of decades ago, near the widespread adoption of the Internet, a new network device became a very important part of the landscape, i.e., the firewall with the access control list (ACL) router. These devices became the sentries to an organization's internal network, still allowing some communication; however, in a controlled and audited manner. It was during this time that the widespread expansion of the firewall spawned significant research into the science of deterministically controlling access, as fast as possible. However, the success of the firewall in securing the enterprise led to an ever increasing complexity in the firewall as the networks became more inter-connected. Over time, the complexity has continued to increase, yielding a difficulty in understanding the allowed access of a particular device.;This dissertation investigates the comprehension of traffic flow through these complex devices by focusing on the following research topics:;• Expands on how a security policy may be processed by decoupling the original rules from the policy, and instead allow a holistic understanding of the solution space being represented. This means taking a set of constraints on access (i.e., firewall rules), synthesizing them into a model that represents an accept and deny space that can be quickly and accurately analyzed.;• Introduces a new set of data structures and algorithms collectively referred to as a Firewall Policy Diagram (FPD). A structure that is capable of modeling Internet Protocol version 4 packet (IPv4) solution space in memory efficient, mathematically set-based entities. Using the FPD we are capable of answering difficult questions such as: what access is allowed by one policy over another, what is the difference in spaces, and how to efficiently parse the data structure that represents the large search space. The search space can be as large as 288; representing the total values available to the source IP address (232), destination IP address (2 32), destination port (216), and protocol (2 8). The fields represent the available bits of an IPv4 packet as defined by the Open Systems Interconnection (OSI) model. Notably, only the header fields that are necessary for this research are taken into account and not every available IPv4 header value.;• Presents a concise, precise, and descriptive language called Firewall Policy Query Language (FPQL) as a mechanism to explore the space. FPQL is a Backus Normal Form (Backus-Naur Form) (BNF) compatible notation for a query language to do just that sort of exploration. It looks to translate concise representations of what the end user needs to know about the solution space, and extract the information from the underlying data structures.;• Finally, this dissertation presents a behavioral model of the capabilities found in firewall type devices and a process for taking vendor-specific nuances to a common implementation. This includes understanding interfaces, routes, rules, translation, and policies; and modeling them in a consistent manner such that the many different vendor implementations may be compared to each other. )Abstract shortened by UMI.).
机译:从安全和法规的角度来看,防火墙,网络设备和管理流量的访问控制列表是现代网络中非常重要的组件。首次连接计算机时,它们正在与可信任的对等方进行通信,邪恶的意图既不被认可也不重要。但是,随着网络范围的扩大,系统不再能够确定对等方是否值得信任或意图是否良好。因此,在几十年前,随着Internet的广泛普及,一种新的网络设备已成为一种非常重要的组成部分,即带有访问控制列表(ACL)路由器的防火墙。这些设备成为组织内部网络的哨兵,仍然允许进行某些通信。但是,以受控和审核的方式。正是在这段时间里,防火墙的广泛扩展催生了对确定性地控制访问速度的科学的大量研究。但是,防火墙在保护企业安全方面的成功导致了防火墙的复杂性不断提高,因为网络之间的连接越来越紧密。随着时间的流逝,复杂性不断增加,在理解特定设备的允许访问方面产生了困难。;本论文通过关注以下研究主题,研究了通过这些复杂设备的流量的理解:可以通过将原始规则与策略分离来处理安全策略,而可以对所表示的解决方案空间有一个整体的了解。这意味着要采取一组访问限制(即防火墙规则),然后将它们综合成一个模型,该模型表示可以快速准确地分析的接受和拒绝空间。;•引入了一组新的数据结构和算法,统称为作为防火墙策略图(FPD)。一种能够在内存有效的,基于数学集合的实体中对Internet协议版本4数据包(IPv4)解决方案空间进行建模的结构。使用FPD,我们能够回答一些难题,例如:一种策略允许对另一种策略进行哪些访问,空间上有什么区别,以及如何有效地解析代表较大搜索空间的数据结构。搜索空间可以多达288个;代表可用于源IP地址(232),目标IP地址(2 32),目标端口(216)和协议(2 8)的总值。字段表示由开放系统互连(OSI)模型定义的IPv4数据包的可用位。值得注意的是,仅考虑了此研究所需的头字段,而不考虑每个可用的IPv4头值。;•提出了一种简洁,准确和描述性的语言,称为防火墙策略查询语言(FPQL),作为探索空间的一种机制。 FPQL是与Backus范式(Backus-Naur Form)(BNF)兼容的表示法,用于查询语言可以进行这种探索。它看起来可以转换最终用户需要了解的有关解决方案空间的简明表示,并从底层数据结构中提取信息。;•最后,本文提出了一种行为类型的防火墙类型设备和过程中发现的功能用于将特定于供应商的细微差别引入通用实施。这包括了解接口,路由,规则,转换和策略;并以一致的方式对它们进行建模,以便可以将许多不同的供应商实现方案相互比较。 UMI缩短了摘要)。

著录项

  • 作者

    Clark, Patrick G.;

  • 作者单位

    University of Kansas.;

  • 授予单位 University of Kansas.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2013
  • 页码 127 p.
  • 总页数 127
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:40:58

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号