Formal firewall conformance testing: an application of test and proof techniques

被引:9
作者
Brucker, Achim D. [1 ]
Bruegger, Lukas [2 ]
Wolff, Burkhart [3 ]
机构
[1] SAP SE, D-76131 Karlsruhe, Germany
[2] ETH, CH-8092 Zurich, Switzerland
[3] Univ Paris 11, LRI, F-91893 Orsay, France
关键词
model-based testing; conformance testing; security testing; firewall; specification-based testing; testing cloud infrastructure; transformation for testability; HOL-Testgen; test and proof; security configuration testing; TESTABILITY; SPECIFICATION;
D O I
10.1002/stvr.1544
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Firewalls are an important means to secure critical ICT infrastructures. As configurable off-the-shelf products, the effectiveness of a firewall crucially depends on both the correctness of the implementation itself as well as the correct configuration. While testing the implementation can be done once by the manufacturer, the configuration needs to be tested for each application individually. This is particularly challenging as the configuration, implementing a firewall policy, is inherently complex, hard to understand, administrated by different stakeholders and thus difficult to validate. This paper presents a formal model of both stateless and stateful firewalls (packet filters), including NAT, to which a specification-based conformance test case generation approach is applied. Furthermore, a verified optimisation technique for this approach is presented: starting from a formal model for stateless firewalls, a collection of semantics-preserving policy transformation rules and an algorithm that optimizes the specification with respect of the number of test cases required for path coverage of the model are derived. We extend an existing approach that integrates verification and testing, that is, tests and proofs to support conformance testing of network policies. The presented approach is supported by a test framework that allows to test actual firewalls using the test cases generated on the basis of the formal model. Finally, a report on several larger case studies is presented. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:34 / 71
页数:38
相关论文
共 39 条
[1]  
ABRIAL Jean-Raymond., 2009, Modeling in Event-B : System and Software Engineering
[2]  
Andrews P., 2002, An Introduction to Mathematical Logic and Type Theory: To Truth Through Proof
[3]  
[Anonymous], LECT NOTES COMPUTER
[4]  
[Anonymous], 2011, P 16 ACM S ACC CONTR
[5]  
[Anonymous], 2008, SEC CYB 44 PRES
[6]  
Ben Youssef N, 2011, COMM COM INF SC, V166, P493
[7]  
Bertot Y., 2004, TEXT THEORET COMP S
[8]   Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations [J].
Bishop, S ;
Fairbairn, M ;
Norrish, M ;
Sewell, P ;
Smith, M ;
Wansbrough, K .
ACM SIGPLAN NOTICES, 2006, 41 (01) :55-66
[9]   A verification approach to applied system security [J].
Brucker A.D. ;
Wolff B. .
International Journal on Software Tools for Technology Transfer, 2005, 7 (3) :233-247
[10]  
Brucker Achim D., 2010, Proceedings of the Third IEEE International Conference on Software Testing, Verification and Validation (ICST 2010), P345, DOI 10.1109/ICST.2010.50