Formal firewall conformance testing: an application of test and proof techniques

被引:9
作者
Brucker, Achim D. [1 ]
Bruegger, Lukas [2 ]
Wolff, Burkhart [3 ]
机构
[1] SAP SE, D-76131 Karlsruhe, Germany
[2] ETH, CH-8092 Zurich, Switzerland
[3] Univ Paris 11, LRI, F-91893 Orsay, France
关键词
model-based testing; conformance testing; security testing; firewall; specification-based testing; testing cloud infrastructure; transformation for testability; HOL-Testgen; test and proof; security configuration testing; TESTABILITY; SPECIFICATION;
D O I
10.1002/stvr.1544
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Firewalls are an important means to secure critical ICT infrastructures. As configurable off-the-shelf products, the effectiveness of a firewall crucially depends on both the correctness of the implementation itself as well as the correct configuration. While testing the implementation can be done once by the manufacturer, the configuration needs to be tested for each application individually. This is particularly challenging as the configuration, implementing a firewall policy, is inherently complex, hard to understand, administrated by different stakeholders and thus difficult to validate. This paper presents a formal model of both stateless and stateful firewalls (packet filters), including NAT, to which a specification-based conformance test case generation approach is applied. Furthermore, a verified optimisation technique for this approach is presented: starting from a formal model for stateless firewalls, a collection of semantics-preserving policy transformation rules and an algorithm that optimizes the specification with respect of the number of test cases required for path coverage of the model are derived. We extend an existing approach that integrates verification and testing, that is, tests and proofs to support conformance testing of network policies. The presented approach is supported by a test framework that allows to test actual firewalls using the test cases generated on the basis of the formal model. Finally, a report on several larger case studies is presented. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:34 / 71
页数:38
相关论文
共 39 条
[31]  
Jurjens Jan., 2001, REVISED PAPERS 4 INT, P308
[32]  
Liu AX, 2008, IEEE INFOCOM SER, P691
[33]  
Marmorstein Robert M., 2006, LISA, V6, P4
[34]  
Matsumoto S, 2009, ADV SOFT COMP, V53, P123
[35]  
Nipkow T., 2002, Isabelle/HOL: a proof assistant for higher-order logic, DOI [10.1007/3-540-45949-9, DOI 10.1007/3-540-45949-9]
[36]  
Peyton Jones S. L., 1993, Conference Record of the Twentieth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, P71, DOI 10.1145/158511.158524
[37]  
Postel J., 1985, File Transfer Protocol
[38]  
SANDHU R., 1999, ACM T INFORM SYST SE, V2, P105
[39]  
SPIVEY J. M., 1992, The Z Notation: A Reference Manual