Fang: A firewall analysis engine

被引:104
作者
Mayer, A [1 ]
Wool, A [1 ]
Ziskind, E [1 ]
机构
[1] Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
来源
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2000年
关键词
D O I
10.1109/SECPRI.2000.848455
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. Configuring these devices to work in unison is difficult especially if they are made by different vendors. Even testing or reverse-engineering an existing configuration (say, when a new security administrator takes over) is hard. Firewall configuration files are written in low-level formalisms, whose readability is comparable to assembly code, and the global policy is spread over all the firewalls that are involved. To alleviate some of these difficulties, we designed and implemented a novel firewall analysis zool. Our software allows the administrator to easily; discover and test the global firewall policy (either a deployed policy or a planned one). Our tool uses a minimal description of the network topology and directly parses the various vendor-specific low-level configuration files. It interacts with the user through a query-and-answer session, which is conducted at a much higher level of abstraction. A typical question our tool carl answer is "from which machines can our DMZ be reached and with which services?". Thus, our tool complements existing vulnerability analysis tools, as it can be used before a policy is actually deployed, it operates on a more understandable level of abstraction, and it deals with all the firewalls at once.
引用
收藏
页码:177 / 187
页数:11
相关论文
共 10 条
[1]   Firewalls: An expert roundtable [J].
Anderson, JP ;
Brand, S ;
Gong, L ;
Haigh, T ;
Lipner, S ;
Lunt, T ;
Nelson, R ;
Neugent, W ;
Orman, H ;
Ranum, M ;
Schell, R ;
Spafford, E .
IEEE SOFTWARE, 1997, 14 (05) :60-66
[2]   Firmato:: A novel firewall management toolkit [J].
Bartal, Y ;
Mayer, A ;
Nissim, K ;
Wool, A .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :17-31
[3]  
Chapman D., 1995, Building internet firewalls
[4]  
Cheswick WilliamR., 1994, FIREWALLS INTERNET S
[5]  
DALHEIMER MK, 1999, PROGRAMMING QT
[6]  
Freiss M., 1998, Protecting Networks with SATAN
[7]  
LIMONCELLI TA, 1999, 1 USENIX C NETW ADM
[8]  
RUIN A, 1997, WEB SECURITY SOURCE
[9]  
STEVENS WR, 1994, TCP IP ILLUSTRATED, V1
[10]  
WALKER KM, 1998, COMPUTER POLICIES SU