Static reachability analysis and validation regarding security policies implemented via packet filters
Approved for public release, distribution unlimited === The ability to statically determine what kinds of packets can be exchanged between two hosts on a network is desirable to those who design and operate networks, but this is a difficult and complex problem. Factors affecting reachability anal...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Online Access: | http://hdl.handle.net/10945/3586 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-3586 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-35862014-11-27T16:04:43Z Static reachability analysis and validation regarding security policies implemented via packet filters Kantz, Stephen M. Xie, Geoffrey Riehle, Richard Naval Postgraduate School (U.S.) Approved for public release, distribution unlimited The ability to statically determine what kinds of packets can be exchanged between two hosts on a network is desirable to those who design and operate networks, but this is a difficult and complex problem. Factors affecting reachability analysis are packet filters, routing policies and packet transformations. The number of variables within and among networks is intractable for manual computation. A proposed solution to this mess is a tractable framework for which to map networks into, thus creating a single unified model for analysis. It depends heavily on the use of transforming the problem into a classical graph problem that can be solved with polynomial time algorithms such as transitive closure. This research develops an automated validation process to test the reachability upper bound calculated from a recent implementation of the framework which focuses specifically on the packet filter aspect, namely access control lists. Real-world network configuration files and network packet flow data from a Tier-1 Internet Service Provider is supplied as the data set. A significant contribution of this thesis is the application of real-world data to the proposed method for static reachability analysis as it pertains to the static testing of security policies applied via packet filters. 2012-03-14T17:38:48Z 2012-03-14T17:38:48Z 2007-03 Thesis http://hdl.handle.net/10945/3586 129950333 Approved for public release, distribution unlimited This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Approved for public release, distribution unlimited === The ability to statically determine what kinds of packets can be exchanged between two hosts on a network is desirable to those who design and operate networks, but this is a difficult and complex problem. Factors affecting reachability analysis are packet filters, routing policies and packet transformations. The number of variables within and among networks is intractable for manual computation. A proposed solution to this mess is a tractable framework for which to map networks into, thus creating a single unified model for analysis. It depends heavily on the use of transforming the problem into a classical graph problem that can be solved with polynomial time algorithms such as transitive closure. This research develops an automated validation process to test the reachability upper bound calculated from a recent implementation of the framework which focuses specifically on the packet filter aspect, namely access control lists. Real-world network configuration files and network packet flow data from a Tier-1 Internet Service Provider is supplied as the data set. A significant contribution of this thesis is the application of real-world data to the proposed method for static reachability analysis as it pertains to the static testing of security policies applied via packet filters. |
author2 |
Xie, Geoffrey |
author_facet |
Xie, Geoffrey Kantz, Stephen M. |
author |
Kantz, Stephen M. |
spellingShingle |
Kantz, Stephen M. Static reachability analysis and validation regarding security policies implemented via packet filters |
author_sort |
Kantz, Stephen M. |
title |
Static reachability analysis and validation regarding security policies implemented via packet filters |
title_short |
Static reachability analysis and validation regarding security policies implemented via packet filters |
title_full |
Static reachability analysis and validation regarding security policies implemented via packet filters |
title_fullStr |
Static reachability analysis and validation regarding security policies implemented via packet filters |
title_full_unstemmed |
Static reachability analysis and validation regarding security policies implemented via packet filters |
title_sort |
static reachability analysis and validation regarding security policies implemented via packet filters |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2012 |
url |
http://hdl.handle.net/10945/3586 |
work_keys_str_mv |
AT kantzstephenm staticreachabilityanalysisandvalidationregardingsecuritypoliciesimplementedviapacketfilters |
_version_ |
1716720800506052608 |