2016 IFIP Networking Conference (IFIP Networking) and Workshops 2016
DOI: 10.1109/ifipnetworking.2016.7497196
|View full text |Cite
|
Sign up to set email alerts
|

Verified iptables firewall analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
46
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 25 publications
(47 citation statements)
references
References 8 publications
1
46
0
Order By: Relevance
“…That is, 1 matches only non-UDP packet headers whose source and destination IP address match 0.0.0.4/30 and 0.0.0.0/28, respectively. However, the PEC-construction schemes in Veriflow and ddNF are not designed for multi-dimensional match conditions with arbitrary ranges, sets of values, or their complements (all of which can be found in iptables rule-sets [33]).…”
Section: B Challenge: Expressivenessmentioning
confidence: 99%
See 2 more Smart Citations
“…That is, 1 matches only non-UDP packet headers whose source and destination IP address match 0.0.0.4/30 and 0.0.0.0/28, respectively. However, the PEC-construction schemes in Veriflow and ddNF are not designed for multi-dimensional match conditions with arbitrary ranges, sets of values, or their complements (all of which can be found in iptables rule-sets [33]).…”
Section: B Challenge: Expressivenessmentioning
confidence: 99%
“…By construction, every child c in C x is a strict subset of x, i.e., c ⊂ x. We emphasize that, for efficiency reasons, we only consider the direct children of x, so DATASET SHORT DESCRIPTION REANNZ-IP [37], [38] 1,159 distinct IP prefixes REANNZ-Full [37], [38] 1,170 OpenFlow rules Azure-DC [25] 2,942 ternary 128-bit vectors Berkeley-IP [14], [39] 584,944 distinct IP prefixes Stanford-IP [11] 197,828 distinct IP prefixes Stanford-Full [11] 2,732 ternary 128-bit vectors Diekmann [33] Thousands of 8-tuples Fig. 9: Summary of datasets all children in C x are mutually incomparable, i.e., for any child c and c ′ in C x , neither c ⊂ c ′ nor c ′ ⊂ c. To implement the propositional logic PEC-emptiness solutions, we construct the following Boolean formula: x ∧ ¬ c∈Cx c -equivalently, x ∧ ¬c 1 ∧ ¬c 2 ∧ .…”
Section: A Implementationsmentioning
confidence: 99%
See 1 more Smart Citation
“…For an deeper look into operating principles and implementation of fffuu we refer to the original publication [12].…”
Section: Operationsmentioning
confidence: 99%
“…Their core functionality can also be reused as a library in further projects. In this article, we will not present the formal background [7], [12], [14], [15], [17], instead, we demonstrate applicability from an operator's point of view; not requiring a single formula.…”
Section: Introductionmentioning
confidence: 99%