2014
DOI: 10.1002/stvr.1544
|View full text |Cite
|
Sign up to set email alerts
|

Formal firewall conformance testing: an application of test and proof techniques

Abstract: This is the peer reviewed version of the following article: Brucker . D., Brügger L., and Wolff B. (2014), Formal firewall conformance testing: an application of test and proof techniques, Softw. Test. Verif. Reliab., 25, 34-71,, which has been published in final form at http://dx.doi.org/10.1002/stvr.1544. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving (http://olabout.wiley.com/WileyCDA/Section/id-820227.html#terms).eprints@whiterose.ac.uk… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…Thus, we focus in this section on security testing techniques that allow to find these kind of vulnerabilities. For instance, we exclude techniques for ensuring the security of the underlying infrastructure such as the network configuration, as, e.g., discussed in [15,20] as well as model-based testing techniques (as discussed in Section 5.1) that are in particular useful for finding logical security flaws. While a holistic security testing strategy makes use of all available security testing strategies, we recommend to concentrate efforts first on techniques for the most common vulnerabilities.…”
Section: Application Of Security Testing Techniquesmentioning
confidence: 99%
“…Thus, we focus in this section on security testing techniques that allow to find these kind of vulnerabilities. For instance, we exclude techniques for ensuring the security of the underlying infrastructure such as the network configuration, as, e.g., discussed in [15,20] as well as model-based testing techniques (as discussed in Section 5.1) that are in particular useful for finding logical security flaws. While a holistic security testing strategy makes use of all available security testing strategies, we recommend to concentrate efforts first on techniques for the most common vulnerabilities.…”
Section: Application Of Security Testing Techniquesmentioning
confidence: 99%
“…TypesCodes ::= (0,0) | (3,0) | (3,1) | (3,2) | (3,3) | (3,4) | (3,5) | (3,6) | (3,7) | (3,8) | (3,9) | (3,10) | (3,11) | (3,12) | (3,13) | (3,14) | (3,15) | (4,0) | (5,0) | (5,1) | (5,2) | (5,3) | (6,0) | (8,0) | (9,0) | (9,16) | (10,0) | (11,0) | (11,1) | (12,0) | (12,1) | (12,2)…”
Section: Network Layer Filteringmentioning
confidence: 99%
“…Several papers exist in the literature that focus on the performance analysis of firewalls [6][7][8][9]. Unfortunately, this kind of studies provide mean values of throughput and latency obtained for popular (standard) protocols such as TCP/IP, HTTP, FTP and so on, while they do not take into account those solutions adopted in industrial networks.…”
Section: Industrial Firewallmentioning
confidence: 99%