Verification of security policy filtering rules by Model Checking

  title={Verification of security policy filtering rules by Model Checking},
  author={Igor V. Kotenko and Olga Polubelova},
  journal={Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems},
One of the very important tasks, a computer network (or security) administrator has to fulfill under constructing a (distributed) firewall security policy, is to guarantee the absence of inconsistencies (or anomalies) and possibility to implement the policy in the given network configuration. The paper outlines an approach to verification of filtering rules of firewalls. The approach is intended for detection and resolution of filtering anomalies in the specification of security policy of… CONTINUE READING
Highly Cited
This paper has 28 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 11 extracted citations

Stabilization, Safety, and Security of Distributed Systems

Lecture Notes in Computer Science • 2012
View 10 Excerpts
Highly Influenced

Policy anomaly detection for distributed IPv6 firewalls

2015 12th International Joint Conference on e-Business and Telecommunications (ICETE) • 2015
View 1 Excerpt

Automatic Verification of Security Policies in Firewalls with Dynamic Rule Sequence

2014 11th International Conference on Information Technology: New Generations • 2014
View 3 Excerpts

Real time verification of firewalls with dynamic rulebase update

2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE) • 2014
View 2 Excerpts

An approach to improve performance of a packet-filtering firewall

2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN) • 2012
View 1 Excerpt

Computer Network Security

Lecture Notes in Computer Science • 2012
View 2 Excerpts


Publications referenced by this paper.
Showing 1-8 of 8 references

A model checkingbased approach for security policy veri  cation of mobile systems

A. C. Kakas, E. C. Lupu, A. Russo
Formal Aspects of Computing Journal • 2010

Analyzing RBAC Security Policy of Implementation Using AST

2009 International Conference on Knowledge and Systems Engineering • 2009

Using argumentation logic for firewall configuration management

2009 IFIP/IEEE International Symposium on Integrated Network Management • 2009

Policy segmentation for intelligent firewall testing

1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec). • 2005


Software Engineering, May
23, No. 5. pp.279-295. • 1997

Similar Papers

Loading similar papers…