...
首页> 外文期刊>Artificial Intelligence Review: An International Science and Engineering Journal >A formal logic approach to firewall packet filtering analysis and generation
【24h】

A formal logic approach to firewall packet filtering analysis and generation

机译:防火墙数据包过滤分析和生成的正式逻辑方法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Recent years have seen a significant increase in the usage of computers and their capabilities to communicate with each other. With this has come the need for more security and firewalls have proved themselves an important piece of the overall architecture, as the body of rules they implement actually realises the security policy of their owners. Unfortunately, there is little help for their administrators to understand the actual meaning of the firewall rules. This work shows that formal logic is an important tool in this respect, because it is particularly apt at modelling real-world situations and its formalism is conductive to reason about such a model. As a consequence, logic may be used to prove the properties of the models it represents and is a sensible way to go in order to create those models on computers to automate such activities. We describe here a prototype which includes a description of a network and the body of firewall rules applied to its components. We were able to detect a number of anomalies within the rule-set: inexistent elements (e.g. hosts or services on destination components), redundancies in rules defining the same action for a network and hosts belonging to it, irrelevance as rules would involve traffic that would not pass through a filtering device, and contradiction in actions applied to elements or to a network and its hosts. The prototype produces actual firewall rules as well, generated from the model and expressed in the syntax of IPChains and Cisco's PIX.
机译:近年来,计算机的使用及其相互通信的能力有了显着提高。随之而来的是对更高安全性的需求,并且防火墙已经证明自己是整个体系结构的重要组成部分,因为防火墙所实施的规则实际上可以实现其所有者的安全策略。不幸的是,对于管理员来说,了解防火墙规则的实际含义几乎没有帮助。这项工作表明形式逻辑在这方面是一个重要的工具,因为它特别适合于对现实情况进行建模,并且形式主义有助于这种模型的推理。结果,逻辑可用于证明其代表的模型的属性,并且是在计算机上创建这些模型以自动执行此类活动的明智方法。我们在这里描述一个原型,其中包括对网络的描述以及应用于其组件的防火墙规则的主体。我们能够检测到规则集中的许多异常情况:不存在的元素(例如,目标组件上的主机或服务),为网络和属于该网络的主机定义相同操作的规则中的冗余,因为规则与涉及流量不会通过过滤设备,并且应用于元素或网络及其主机的操作存在矛盾。该原型还生成实际的防火墙规则,这些规则是从模型生成的,并以IPChains和Cisco的PIX的语法表示。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号