skip to main content
10.1145/1029133.1029143acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Automatic analysis of firewall and network intrusion detection system configurations

Published:29 October 2004Publication History

ABSTRACT

Given a network that deploys multiple firewalls and network intrusion detection systems (NIDSs), ensuring that these security components are correctly configured is a challenging problem. Although models have been developed to reason independently about the effectiveness of firewalls and NIDSs, there is no common framework to analyze their interaction. This paper presents an integrated, constraint-based approach for modeling and reasoning about these configurations. Our approach considers the dependencies among the two types of components, and can reason automatically about their combined behavior. We have developed a tool for the specification and verification of networks that include multiple firewalls and NIDSs, based on this approach. This tool can also be used to automatically generate NIDS configurations that are optimal relative to a given cost function.

References

  1. 3Com. 3Com Embedded Firewall. Software for the 3CR990 Network Interface Card (NIC) Family, Dec. 2001.Google ScholarGoogle Scholar
  2. Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit. In IEEE Symposium on Security and Privacy, pages 17--31, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  3. R. E. Bryant. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers, C-35(8):677--691, Aug. 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Burns, A. Cheng, P. Gurung, S. Rajagopalan, P. Rao, D. Rosenbluth, A. Surendran, and J. D.M. Martin. Automatic management of network security policy. In DARPA Information Survivability Conference and Exposition (DISCEX II) Volume 2, pages 1012--1026, Anaheim, California, June 12--14, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. M. Cheadle, W. Harvey, A. J. Sadler, J. Schimpf, K. Shen, and M. G. Wallace. ECLiPSe: An Introduction. Technical Report IC-Parc-03-1, IC--Parc, Imperial College London, 2003.Google ScholarGoogle Scholar
  6. S. Cheung, U. Lindqvist, and M. W. Fong. Modeling multistep cyber attacks for scenario recognition. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), pages 284--292, Washington, D.C., Apr. 22--24, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  7. Cisco Systems, Inc. Cisco PIX Firewall and VPN Configuration Guide: Version 6.3, 2003. http://www.cisco.com.Google ScholarGoogle Scholar
  8. E. M. Clarke, O. Grumberg, and D. A. Peled. Model Checking. The MIT Press, Cambridge, Massachusetts, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Eronen and J. Zitting. An expert system for analyzing firewall rules. In Proc. 6th Nordic Workshop on Secure IT Systems (NordSec 2001), pages 100--107, Nov. 2001.Google ScholarGoogle Scholar
  10. Z. J. Fu and S. F. Wu. Automatic generation of IPSec/VPN security policies in an intra-domain environment. In 12th International Workshop on Distributed Systems: Operations and Management (DSOM'2001), France, Oct. 15--17, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  11. G. R. Ganger, G. Economou, and S. M. Bielski. Finding and containing enemies within the walls with self-securing network interfaces. Technical Report CMU-CS-03-109, School of Computer Science, Carnegie-Mellon University, Jan. 2003.Google ScholarGoogle Scholar
  12. J. D. Guttman. Filtering postures: Local enforcement for global policies. In IEEE Symposium on Security and Privacy, pages 120--129, Oakland, California, May 1997. Extended version available as MITRE technical report, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. D. Guttman and A. L. Herzog. Rigorous automated network security management. Technical report, MITRE Corp., Aug. 2003. Preliminary version appeared in Proc. VERIFY 2002.Google ScholarGoogle Scholar
  14. S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith. Implementing a distributed firewall. In ACM Conf. on Computer and Communications Security, pages 190--199, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. Markham and C. Payne. Security at the network edge: A distributed firewall architecture. In DARPA Information Survivability Conference and Exposition (DISCEX II) Volume 1, pages 279--286, Anaheim, California, June 12--14, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  16. A. Mayer, A. Wool, and E. Ziskind. Fang: A firewall analysis engine. In IEEE Symposium on Security and Privacy, pages 177--187, Oakland, California, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Porras and P. Neumann. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In Proceedings of the 20th National Information Systems Security Conference, pages 353--365, Baltimore, MD, Oct. 1997.Google ScholarGoogle Scholar
  18. T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., Jan. 1998.Google ScholarGoogle Scholar
  19. M. Roesch. Snort: Lightweight intrusion detection for networks. In USENIX LISA'99, Nov. 1999. www.snort.org. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. E. Uribe, S. Cheung, J. Levy, and A. Valdes. Intrusion tolerance and worm spread. In Fast Abstracts, Dependable Systems and Networks. IEEE, June 2003.Google ScholarGoogle Scholar
  21. A. Wool. Architecting the Lumeta firewall analyzer. In sProc. of the 10th USENIX Security Symposium, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Automatic analysis of firewall and network intrusion detection system configurations

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      FMSE '04: Proceedings of the 2004 ACM workshop on Formal methods in security engineering
      October 2004
      102 pages
      ISBN:1581139713
      DOI:10.1145/1029133

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 October 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader