On the modular verification and design of firewalls

Firewalls, packet filters placed at the boundary of a network in order to screen incoming packets of traffic (and discard any undesirable packets), are a prominent component of network security. In this dissertation, we make several contributions to the study of firewalls. 1. Current algorithms for...

Full description

Bibliographic Details
Main Author: Bhattacharya, Hrishikesh
Format: Others
Language:English
Published: 2012
Subjects:
Online Access:http://hdl.handle.net/2152/ETD-UT-2012-08-5931
id ndltd-UTEXAS-oai-repositories.lib.utexas.edu-2152-ETD-UT-2012-08-5931
record_format oai_dc
spelling ndltd-UTEXAS-oai-repositories.lib.utexas.edu-2152-ETD-UT-2012-08-59312015-09-20T17:12:05ZOn the modular verification and design of firewallsBhattacharya, HrishikeshFirewallsFirst matchVerificationRule sequenceFirewalls, packet filters placed at the boundary of a network in order to screen incoming packets of traffic (and discard any undesirable packets), are a prominent component of network security. In this dissertation, we make several contributions to the study of firewalls. 1. Current algorithms for verifying the correctness of firewall policies use O(n[superscrip d]) space, where n is the number of rules in the firewall (several thousand) and d the number of fields in a rule (about five). We develop a fast probabilistic firewall verification algorithm, which runs in time and space O(nd), and determines whether a firewall F satisfies a property P. The algorithm is provably correct in several interesting cases -- notably, for every instance where it states that F does not satisfy P -- and the overall probability of error is extremely small, of the order of .005%. 2. As firewalls are often security-critical systems, it may be necessary to verify the correctness of a firewall with no possibility of error, so there is still a need for a fast deterministic firewall verifier. In this dissertation, we present a deterministic firewall verification algorithm that uses only O(nd) space. 3. In addition to correctness, optimizing firewall performance is an important issue, as slow-running firewalls can be targeted by denial-of-service attacks. We demonstrate in this dissertation that in fact, there is a strong connection between firewall verification and detection of redundant rules; an algorithm for one can be readily adapted to the other task. We suggest that our algorithms for firewall verification can be used for firewall optimization also. 4. In order to help design correct and efficient firewalls, we suggest two metrics for firewall complexity, and demonstrate how to design firewalls as a battery of simple firewall modules rather than as a monolithic sequence of rules. We also demonstrate how to convert an existing monolithic firewall into a modular firewall. We propose that modular design can make firewalls easy to design and easy to understand. Thus, this dissertation covers all stages in the life cycle of a firewall -- design, testing and verification, and analysis -- and makes contributions to the current state of the art in each of these fields.text2012-11-13T18:59:17Z2012-11-13T18:59:17Z2012-082012-11-13August 20122012-11-13T18:59:23Zthesisapplication/pdfhttp://hdl.handle.net/2152/ETD-UT-2012-08-59312152/ETD-UT-2012-08-5931eng
collection NDLTD
language English
format Others
sources NDLTD
topic Firewalls
First match
Verification
Rule sequence
spellingShingle Firewalls
First match
Verification
Rule sequence
Bhattacharya, Hrishikesh
On the modular verification and design of firewalls
description Firewalls, packet filters placed at the boundary of a network in order to screen incoming packets of traffic (and discard any undesirable packets), are a prominent component of network security. In this dissertation, we make several contributions to the study of firewalls. 1. Current algorithms for verifying the correctness of firewall policies use O(n[superscrip d]) space, where n is the number of rules in the firewall (several thousand) and d the number of fields in a rule (about five). We develop a fast probabilistic firewall verification algorithm, which runs in time and space O(nd), and determines whether a firewall F satisfies a property P. The algorithm is provably correct in several interesting cases -- notably, for every instance where it states that F does not satisfy P -- and the overall probability of error is extremely small, of the order of .005%. 2. As firewalls are often security-critical systems, it may be necessary to verify the correctness of a firewall with no possibility of error, so there is still a need for a fast deterministic firewall verifier. In this dissertation, we present a deterministic firewall verification algorithm that uses only O(nd) space. 3. In addition to correctness, optimizing firewall performance is an important issue, as slow-running firewalls can be targeted by denial-of-service attacks. We demonstrate in this dissertation that in fact, there is a strong connection between firewall verification and detection of redundant rules; an algorithm for one can be readily adapted to the other task. We suggest that our algorithms for firewall verification can be used for firewall optimization also. 4. In order to help design correct and efficient firewalls, we suggest two metrics for firewall complexity, and demonstrate how to design firewalls as a battery of simple firewall modules rather than as a monolithic sequence of rules. We also demonstrate how to convert an existing monolithic firewall into a modular firewall. We propose that modular design can make firewalls easy to design and easy to understand. Thus, this dissertation covers all stages in the life cycle of a firewall -- design, testing and verification, and analysis -- and makes contributions to the current state of the art in each of these fields. === text
author Bhattacharya, Hrishikesh
author_facet Bhattacharya, Hrishikesh
author_sort Bhattacharya, Hrishikesh
title On the modular verification and design of firewalls
title_short On the modular verification and design of firewalls
title_full On the modular verification and design of firewalls
title_fullStr On the modular verification and design of firewalls
title_full_unstemmed On the modular verification and design of firewalls
title_sort on the modular verification and design of firewalls
publishDate 2012
url http://hdl.handle.net/2152/ETD-UT-2012-08-5931
work_keys_str_mv AT bhattacharyahrishikesh onthemodularverificationanddesignoffirewalls
_version_ 1716822872382504960